Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.
study aimed to investigate the effect of fish bone in the of chemistry and self-organized learning for students of the second grade‚ achievement . The study sample consisted of 84 students from the second grade students middel in the of alrasheed boysschool, of the Directorate of Educational Karkh II, in two divisions, Division of (a) an experimental group that studied the strategy fish bone, and the Division (d) a control group which studied the usual way. The results indicated the presence of significant differences in favor of the experimental group that studied using the fish bone in achievement and learning self-organized strategy students
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MorePhosphorus (P) is an element that is potatoes require in large amounts. Soil pH is a crucial factor impacting phosphorus availability in potato production. This study was conducted to evaluate the influence of P application rates on the P efficiency for tuber yield, specific gravity, and P uptake. Additionally, the relationship between soil pH and total potato tuber yield was determined. Six rates of P fertilization (0–280 kg P ha−1) were applied at twelve different sites across Northern Maine. Yield parameters were not responsive to P application rates. However, regression analysis showed that soil pH was significantly correlated with total potato tuber yield(R2 = 0.38). Sites with soil pH values < 6 had total tuber yields,
... Show MoreThis paper studies the effect of contact areas on the transient response of mechanical structures. Precisely, it investigates replacing the ordinary beam of a structure by two beams of half the thickness, which are joined by bolts. The response of these beams is controlled by adjusting the tightening of the connecting bolts and hence changing the magnitude of the induced frictional force between the two beams which affect the beams damping capacity. A cantilever of two beams joined together by bolts has been investigated numerically and experimentally. The numerical analysis was performed using ANSYS-Workbench version 17.2. A good agreement between the numerical and experimental results has been obtained. In general, results s
... Show MoreIn this study, dark and various light qualities (white, red, green, and blue) were applied to evaluate their effects on growth characteristics, chemical content, and callus characteristics of Rosa damascene Mill. and Rosa hybirda L.
Explant (single-node and shoot tips) cultured on MS media supplemented with sucrose, agar, and plant growth regulators ( Kin 0.5 mg/l and IBA 1 mg/l for whole plant formation experiment or 1 mg/l kin with 0.5 mg/l IBA for callus experiment), incubated in a growth chamber.
The results of the whole plant formation experiment showed variation in growth characteristics in two types of Rosa, Green and white light caused the height ratio of shoot growth compared wi
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreThe adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe Early Cenomanian Ahmadi carbonates succession in selected oil-wells in south Iraqi oil fields have undergone; into sequence stratigraphic analysis as new reservoir stratigraphy optimization understanding. The sequence stratigraphy context: has applied on the mentioned carbonate reservoir in selected oil-wells from West-Qurna and Majnoon oil fields, with respect to Arabian-plate (AP) chronosequence stratigraphy and chrono-markers setting.
A meso-genetic buildup has infra-structured the studied Formation based-on; smallest-set of the genetically-related high-frequency lithofacies-cycle and cycles-set modeling. A genetic sequence (meso-sequence one MS1) is described as a well-encountered buildup between the (MFS-K120 of lower Ah
... Show More