Preferred Language
Articles
/
bsj-6624
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
مجلة البحوث التربوية والنفسية
أثر إستراتيجية عظم السمك بتحصيل الكيمياء والتعلم المنظم ذاتيا
...Show More Authors

study aimed to investigate the effect of fish bone in the of chemistry and self-organized learning for students of the second grade‚ achievement . The study sample consisted of 84 students from the second grade students middel in the of alrasheed boysschool, of the Directorate of Educational Karkh II, in two divisions, Division of (a) an experimental group that studied the strategy fish bone, and the Division (d) a control group which studied the usual way. The results indicated the presence of significant differences in favor of the experimental group that studied using the fish bone in achievement and learning self-organized strategy students

Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 03 2020
Journal Name
Agriculture
Potato Phosphorus Response in Soils with High Value of Phosphorus
...Show More Authors

Phosphorus (P) is an element that is potatoes require in large amounts. Soil pH is a crucial factor impacting phosphorus availability in potato production. This study was conducted to evaluate the influence of P application rates on the P efficiency for tuber yield, specific gravity, and P uptake. Additionally, the relationship between soil pH and total potato tuber yield was determined. Six rates of P fertilization (0–280 kg P ha−1) were applied at twelve different sites across Northern Maine. Yield parameters were not responsive to P application rates. However, regression analysis showed that soil pH was significantly correlated with total potato tuber yield(R2 = 0.38). Sites with soil pH values < 6 had total tuber yields,

... Show More
View Publication
Crossref (21)
Crossref
Publication Date
Sat Jul 20 2019
Journal Name
Al-nahrain Journal For Engineering Sciences
Inducing Frictional Force to Enhance the Transient Response in Beams
...Show More Authors

This paper studies the effect of contact areas on the transient response of mechanical structures. Precisely, it investigates replacing the ordinary beam of a structure by two beams of half the thickness, which are joined by bolts. The response of these beams is controlled by adjusting the tightening of the connecting bolts and hence changing the magnitude of the induced frictional force between the two beams which affect the beams damping capacity. A cantilever of two beams joined together by bolts has been investigated numerically and experimentally. The numerical analysis was performed using ANSYS-Workbench version 17.2. A good agreement between the numerical and experimental results has been obtained. In general, results s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Response of Two Rosa sp. to Light Quality in Vitro.
...Show More Authors

     In this study, dark and various light qualities (white, red, green, and blue) were applied to evaluate their effects on growth characteristics, chemical content, and callus characteristics of Rosa damascene Mill. and Rosa hybirda L.

   Explant (single-node and shoot tips) cultured on MS media supplemented with sucrose, agar, and plant growth regulators ( Kin 0.5 mg/l and IBA 1 mg/l for whole plant formation experiment or 1 mg/l kin with 0.5 mg/l IBA for callus experiment), incubated in a growth chamber.

   The results of the whole plant formation experiment showed variation in growth characteristics in two types of Rosa, Green and white light caused the height ratio of shoot growth compared wi

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayesian methods to estimate the failure probability for electronic systems in case the life time data are not available
...Show More Authors

In this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company.  The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system.  This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system.  We calculate the range for each estimator by using the Maximum Likelihood estimator.  We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after  it checked by the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Sequence Stratigraphy for Optimize Development Strategy, Ahmadi Carbonates, Case Study, South Iraq Oil Fields.
...Show More Authors

The Early Cenomanian Ahmadi carbonates succession in selected oil-wells in south Iraqi oil fields have undergone; into sequence stratigraphic analysis as new reservoir stratigraphy optimization understanding. The sequence stratigraphy context: has applied on the mentioned carbonate reservoir in selected oil-wells from West-Qurna and Majnoon oil fields, with respect to Arabian-plate (AP) chronosequence stratigraphy and chrono-markers setting.

A meso-genetic buildup has infra-structured the studied Formation based-on; smallest-set of the genetically-related high-frequency lithofacies-cycle and cycles-set modeling. A genetic sequence (meso-sequence one MS1) is described as a well-encountered buildup between the (MFS-K120 of lower Ah

... Show More
View Publication Preview PDF