Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.
Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis growing interest of the international scientific specialized commissions is due to the role that the audit committee can play, as one of companies’ governance tools, to increase the accuracy and transparency of the financial information disclosed by the companies, through its oversight role on the process of preparing financial reports, its supervision on the internal audit function within the companies, and supporting its independency, as well as coordinating the efforts between the internal control unites and the external auditor represented by the (Board of Supreme Audit) to clear the observations and irregularities in order to reduce the fraud cases.
This research was built on an applied sample of audit committee works
... Show MoreThe centers of cities and historical quarter are exposed to a severe threat to the values of the physical and legal urban environment as a result of the value deterioration and the emergence, emergence and spread of new values on the intellectual and urban context, which generates the loss of the urban environment for its spatio-temporal continuity, flexibility, adaptation and continuity, and thus urban obsolescence, Hence the problem of the research in “the lack of comprehensiveness of studies on the phenomenon of urban obsolescence and its impact on the decline in the values of the quality of the built environment in historic
... Show MoreThe research seeks to find out the extent of the coverage of the Mosul press to the issues of psychological and social effects of the organization "IS" on the community of Mosul, by analyzing the content of the newspapers “Economic City” and “Mosul News”. As well as to stand at the types of psychological and social effects and their repercussions on the Mosul community including figures, statistics and evidence that were covered in the theoretical study of these topics.
This study is the first scientific diagnosis to reveal the size and types of psychological and social effects of the “ISIS” organization through what was monitored by the Mosul press. The study seeks to draw the attention of officials, decision-m
... Show MoreThe precise classification of DNA sequences is pivotal in genomics, holding significant implications for personalized medicine. The stakes are particularly high when classifying key genetic markers such as BRAC, related to breast cancer susceptibility; BRAF, associated with various malignancies; and KRAS, a recognized oncogene. Conventional machine learning techniques often necessitate intricate feature engineering and may not capture the full spectrum of sequence dependencies. To ameliorate these limitations, this study employs an adapted UNet architecture, originally designed for biomedical image segmentation, to classify DNA sequences.The attention mechanism was also tested LONG WITH u-Net architecture to precisely classify DNA sequences
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show More