Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.
The reduction to pole of the aeromagnetic map of the western desert of Iraq has been used to outline the main basement structural features. Three selected magnetic anomalies are used to determine the depths of their magnetic sources. The estimated depths are obtained by using slope half slope method and have been corrected through the application of a published nomogram. These depths are compared with previous published depth values which provide a new look at the basement of the western desert in addition to the thickness map of the Paleozoic formations. The results shed light on the important of the great depths of the basement structures and in turn the sedimentary cover to be considered for future hydrocarbon exploration
Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreThe research seeks to study the subject (Media separation: the Relationship of Arab Immigrants with the Media of the Countries of Diaspora/ Sweden as a model). Where this phenomenon, "problem" has not been subjected to an in-depth study to find out the causes of this media separation and its repercussions on the immigrant, whether in the problem of integration, or his opportunity to work, or adapt to live in the new society.
Separation is a kind of word that is rarely used in Arabic media studies, relevant, sometimes, to the meaning of “refraining from watching TV or listening to the radio or reading newspapers”. Sometimes, it means “not tuning to or using any form of media like radios or newspapers to be updated about what
... Show Moreالملخص: تعد عناصر اللياقة البدنية العمود الفقري للألعاب الرياضية وخصوصا في الالعاب الجماعية ومنها لعبة كرة القدم للصالات والتي تعد من الالعاب الرياضية التي تتطلب بذل جهود كبيرة خلال المنافسة نظرا لطبيعة الاداء الذي يمتاز بالقوة والسرعة طيلة شوطي المباراة وهذا يتطلب من اللاعب امتلاكه للياقة بدنية عالية تؤهله للإيفاء بهذه المتطلبات خلال المنافسة، لذا نجد المدربين يتبعون كافة الاساليب وطرائق التدريب في سب
... Show Moreملخص البحث: يعد اسلوب تدريب المقاومات المرنة واحد من اساليب تدريب القوة العضلية فهو النظام الذي يتم من خلاله استخدام تمرينات يتم ادائها ضد مقاومات متغيرة مثل الحبال المطاطية او اشرطة الساندو، ويمتاز هذا الاسلوب بتغير الشدة خلال اداء التمرين الواحد اي ان كلما تم مط الحبل المطاطي ازدادت مقاومته وبالتالي فان اللاعب يستخرج قوته اكثر كلما اقترب الى مركزية الحركة في التمرين وهذا هو جوهر الاختلاف بينه وبين استخد
... Show More