Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.
Abstract
This study aims at investigating the effectiveness of the cooperative inquiry strategy in developing the achievement and development of mathematical communication skills of elementary school students. To achieve this aim, the experimental method was utilized. The study sample consisted of an experimental group (n = 34) and a control group (n = 31), which were randomly selected from primary schools. A Teacher's Guide for teaching a unit entitled "Statistics and Graphic Representations" for the sixth elementary graders in the first semester were devised. A (30) multiple-choice item achievement test distributed at the levels of (recall, comprehension, and application), as well as an (18) item mathematical c
... Show MoreOne of the globalization results is (VAT) , so it is important to consider its results and impact on the tax system.
The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.
The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.
The history of (VAT)was also studied mentiorned and studied.
As a conclusion (VAT) is one of the m
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreThis study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study.
... Show MoreFiber‐reinforced elastic laminated composites are extensively used in several domains owing to their high specific stiffness and strength and low specific density. Several studies were performed to ascertain the factors that affect the composite plates’ dynamic properties. This study aims to derive a mathematical model for the dynamic response of the processed composite material in the form of an annular circular shape made of polyester/E‐glass composite. The mathematical model was developed based on modified classical annular circular plate theory under dynamic loading, and all its formulas were solved using MATLAB 2023. The mathematical model was also verified with real experimental work involving the vibration test of the f
... Show MoreUltrasonic extraction is an inexpensive, simple and efficient alternative to conventional extraction techniques, as compared with other novel extraction techniques such as microwave-assisted extraction & supercritical fluid extraction techniques, the ultrasound apparatus is cheaper and its operation is easier. Ultrasound assisted extraction has risen rapidly in the latest decade, and for most applications it has proven to be effective compared to traditional extraction techniques. In this paper, a method of ultrasonic-assisted extraction was used to extract Inulin from tubers of Jerusalem artichoke, which have been reported to have several medicinal properties and uses. Inulin is a storage carbohydrate found in many plants especially
... Show MoreEleven hymenopterous species: two braconids, seven eulophids and two pteromalids
parasitized the larvae of Phytomyza horticola Goureau. The activity of the parasites began at
the end of April and evidently increased during May. The female of the parasites fed and
parasitized mostly on the second and third larval instars of P. horticola . Diglyphus iseae
Walker and Cirrospilus vittatus Walker were dominant larval parasites. Chrysocharis
pentheus Walker and Pediobius acantha Walker were main pupal parasites.