Preferred Language
Articles
/
bsj-6624
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of Physical Education
Time of Motor Response To Stimuli (Auditory and Visual) and Its relationship with Blocking Accuracy In Volleyball
...Show More Authors

The research aim at identifying the time of motor response to auditory and visual stimuli as well as identifying the accuracy of blocking and finding the relationship between motor repose time and blocking accuracy. The community was (7) primer soccer league of 2019 – 2020 and the subjects were (24) volleyball players from Al Jaish and Al Shorta clubs ten players from Al Shorta club performed the pilot study. The researchers used the descriptive method and the data was collected and treated using SPSS. The results showed a significant relationship between response time and blocking accuracy. The researchers recommended concentrating on applying scientific principles for developing time of motor response in a manner suitable for bl

... Show More
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
On The Dynamics of Discrete-Time Prey-Predator System with Ratio-Dependent Functional Response
...Show More Authors

In this paper, a discrete- time ratio-dependent prey- predator model is proposed and analyzed. All possible fixed points have been obtained. The local stability conditions for these fixed points have been established. The global stability of the proposed system is investigated numerically. Bifurcation diagrams as a function of growth rate of the prey species are drawn. It is observed that the proposed system has rich dynamics including chaos.

View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Geological Journal
Geochemical Criteria for Discriminating Shallow and Deep Environments in Oligocene-Miocene Succession, Western Iraq
...Show More Authors

The geochemical study of the Oligocene-Miocene succession Anah, Euphrates, and Fatha formations, western Iraq, was carried out to discriminate their depositional environments. Different major and trace patterns were observed between these formations. The major elements (Ca, Mg, Fe, Mn, K, and Na) and trace elements (Li, V, Cr, Co, Ni, Cu, Zn, Ga, Rb, Sr, Zr, Cs, Ba, Hf, W, Pb, Th, and U) are a function of the setting of the depositional environments. The reefal facies have lower concentrations of MgO, Li, Cr, Co, Ni, Ga, Rb, Zr, and Ba than marine and lagoonal facies but have higher concentrations of CaO, V, and Sr than it. Whereas dolomitic limestone facies are enriched V, and U while depletion in Li, Cr, Ni, Ga, Rb, Sr, Zr, Ba, an

... Show More
View Publication
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Over application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))
...Show More Authors

Over application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))

Become attention to quality is a global phenomenon, and I took organizations and governments around the world attaches special attention, but we can say that quality has become the first function for many organizations, and has become a management philosophy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
A Multi-Objective Evolutionary Algorithm based Feature Selection for Intrusion Detection
...Show More Authors

Nowad ays, with the development of internet communication that provides many facilities to the user leads in turn to growing unauthorized access. As a result, intrusion detection system (IDS) becomes necessary to provide a high level of security for huge amount of information transferred in the network to protect them from threats. One of the main challenges for IDS is the high dimensionality of the feature space and how the relevant features to distinguish the normal network traffic from attack network are selected. In this paper, multi-objective evolutionary algorithm with decomposition (MOEA/D) and MOEA/D with the injection of a proposed local search operator are adopted to solve the Multi-objective optimization (MOO) followed by Naï

... Show More
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage
...Show More Authors

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Deadline-Budget Constrained Task Admission Control for a Software-as-a-Service Provider in Cloud Computing
...Show More Authors

    Cloud computing is a pay-as-you-go model that provides users with on-demand access to services or computing resources. It is a challenging issue to maximize the service provider's profit and, on the other hand, meet the Quality of Service (QoS) requirements of users. Therefore, this paper proposes an admission control heuristic (ACH) approach that selects or rejects the requests based on budget, deadline, and penalty cost, i.e., those given by the user. Then a service level agreement (SLA) is created for each selected request. The proposed work uses Particle Swarm Optimization (PSO) and the Salp Swarm Algorithm (SSA) to schedule the selected requests under budget and deadline constraints. Performances of PSO and SSA with and witho

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun May 27 2018
Journal Name
Journal Of Advanced Transportation
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
...Show More Authors

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Effect of Genetic Algorithm as a Feature Selection for Image Classification
...Show More Authors

     Analysis of image content is important in the classification of images, identification, retrieval, and recognition processes. The medical image datasets for content-based medical image retrieval (  are large datasets that are limited by high computational costs and poor performance. The aim of the proposed method is to enhance this image retrieval and classification by using a genetic algorithm (GA) to choose the reduced features and dimensionality. This process was created in three stages. In the first stage, two algorithms are applied to extract the important features; the first algorithm is the Contrast Enhancement method and the second is a Discrete Cosine Transform algorithm. In the next stage, we used datasets of the medi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref