Cloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optimisation for web-based services. This study could aid in identification and generation of cloud-based services that use multi-tenant and load-balancing methodologies for the best quality of service.
The Yamama Formation includes important carbonates reservoir that belongs to the Lower Cretaceous sequence in Southern Iraq. This study covers two oil fields (Sindbad and Siba) that are distributed Southeastern Basrah Governorate, South of Iraq. Yamama reservoir units were determined based on the study of cores, well logs, and petrographic examination of thin sections that required a detailed integration of geological data and petrophysical properties. These parameters were integrated in order to divide the Yamama Formation into six reservoir units (YA0, YA1, YA2, YB1, YB2 and YC), located between five cap rock units. The best facies association and petrophysical properties were found in the shoal environment, wh
... Show MorePractical application is an effective tool for preparing qualified scientific and technical cadres if applied correctly and efficiently. In addition to being the complementary part of everything that has been studied in the years of study, it is a scientific linking tool between theory and application. Here lies the importance of this research in clarifying the central and important role that practical application plays in general in raising the scientific level of the student, and the extent of the suitability of the curriculum and means of practical application and the extent and needs of the students applying at the Institute of Administration - Rusafa - Department of Information Technology and Libraries. This research attempted to answe
... Show MoreObjective: determine the effectiveness of an education program on youth's level of awareness towards
household waste control.
Methodology: A Quazi-experimental study was conducted. Non-probability (quota sample) of (80) young
persons is selected from Baghdad Governorate. They are divided into two equal groups of (40) subjects for the
study group which is exposed to the household waste control educational program. The remaining is the
control group which is not exposed to the educational program.
Results: The findings of the study indicated that youth of the study group have got benefits from the
implementation of the educational program towards household waste control and change has occurred to
their awareness tow
Geographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf
... Show MoreIn this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe
... Show MoreAbstract
were determine the problem of current research to answer the question on the consciousness of the Ministry of Agriculture to adopt Staffing strategy and identify the shortcomings as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as dependent variable is described in four dimensions (leadership, strategy, structure and processes, culture), in this research were Used analytical descriptive style . This research aims to identify the correlation and impact of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between
... Show MoreIncorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co
... Show More