Edge computing is proved to be an effective solution for the Internet of Things (IoT)-based systems. Bringing the resources closer to the end devices has improved the performance of the networks and reduced the load on the cloud. On the other hand, edge computing has some constraints related to the amount of the resources available on the edge servers, which is considered to be limited as compared with the cloud. In this paper, we propose Software-Defined Networking (SDN)-based resources allocation and service placement system in the multi-edge networks that serve multiple IoT applications. In this system, the resources of the edge servers are monitored using the proposed Edge Server Application (ESA) to determine the state of the edge server and, therefore, the acceptable services by each server. Benefiting from the information gathered by ESA, the service offloading decision would be taken by the proposed SDN Non-core Application (SNA) in a way that ensures an efficient load distribution and better resources utilization for the edge servers. A Weighted Aggregated Sum Product Assessment Method (WASPAS) was used to determine the best edge server. The proposed system was compared with a non-SDN system and showed improvement in the performance and the utilization of resources of the edge servers. Furthermore, the request handling time was considerably reduced and settled in constant rates for a different number of devices.
The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show MoreBackground: In the traditional protocol, the patient should wait after extraction up to six months to place the dental implant in healed bone, this waiting time accompanied by varying degrees of alveolar bone changes. In order to overcome these problems, immediate implant placement in the fresh extraction socket was introduced. The Aim of this study was to evaluate the outcome of the immediate implant placement utilizing Resonance Frequency Analysis (RFA) to quantify implant stability and osseointegration. Materials and Methods: A total of (23) patients participated in the study, receiving (44) implants placed in the sockets of teeth indicated for extraction. Clinical and radiographic preoperative assessment was accomplished for each patie
... Show MoreCommunication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the
A Multiple System Biometric System Based on ECG Data
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreNative speakers of English from different parts of the world have different accents,but the differences of accents are mainly the result of differences in the sound of vowels and consonants . The actual use of all these sounds in combination leads the speaker to produce a number of segments which only appear on the production level and realized on the perceptual one . RP pronunciation represents the teachable variety in all Iraqi universities because it is the most acceptable and understandable accent all over the world and not only in South East London ..The structure of the English syllable in RP pronunciation is influenced by the appearance of certain allophones especially aspiration and glottalization which ch
... Show MoreThe main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free
... Show MoreInternet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u
... Show More