Preferred Language
Articles
/
kxeBNY8BVTCNdQwCVGGq
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In this article, a summary of heuristic and meta-heuristic methods for solving the task scheduling optimization in cloud-fog systems is presented. The cost and time aware scheduling methods for both bag of tasks and workflow tasks are reviewed, discussed, and analyzed thoroughly to provide a clear vision for the readers in order to select the proper methods which fulfill their needs.

Crossref
View Publication
Publication Date
Thu Jun 16 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Optimization algorithms for transportation problems with stochastic demand
...Show More Authors

The purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Pharm. Sci. & Res.
Review and Description for Theretra alecto Boisduval 1827, (Lepidoptera: Sphingidae) in Iraq
...Show More Authors

The current study included a review of the registration and description of the Theretra alecto Boi, 1827 (Levant hawk moth), samples were collected from various areas of the Baghdad belt and the provinces of the Middle Euphrates, confirmation in the description was on the most important parts of the body included the head and it's appendages, pronotum, wings as well as male and female genitalia. The morphological characteristics under study were enhanced by illustrations and images. Information on the locations and date of the collection was also confirmed. This study aims to identify the most important characteristics of the diagnosis of the species and the review of appearance variations, especially the analytical style of wings, coupling

... Show More
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
Meta-Motivation and its Relationship to the Uniqueness Seeking of the Engineering Colleges Students
...Show More Authors

The current study aims to identify:The meta-motivation and Uniqueness seeking of the study sample. The correlated  relationship among them. The present study sample consists of (400) students from the colleges of engineering, University of Baghdad, and the University of Technology in the academic year (2019-2020), and the researcher has adopted the Chen Scale (1995)to measure the meta-motivation after its translation into Arabic by(Al-Samawi,2011).The scale includes six dimensions. The researcher has also adopted the Snyder&Fromkin scale (1980) to measure the uniqueness  seeking after translating and adapting it into the Arabic environment. The scale consists of three dimensions. The results show that students of the Facult

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 09 2025
Journal Name
Scientific Reports
Machine learning models for predicting morphological traits and optimizing genotype and planting date in roselle (Hibiscus Sabdariffa L.)
...Show More Authors

Accurate prediction and optimization of morphological traits in Roselle are essential for enhancing crop productivity and adaptability to diverse environments. In the present study, a machine learning framework was developed using Random Forest and Multi-layer Perceptron algorithms to model and predict key morphological traits, branch number, growth period, boll number, and seed number per plant, based on genotype and planting date. The dataset was generated from a field experiment involving ten Roselle genotypes and five planting dates. Both RF and MLP exhibited robust predictive capabilities; however, RF (R² = 0.84) demonstrated superior performance compared to MLP (R² = 0.80), underscoring its efficacy in capturing the nonlinear genoty

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
Conjunction meaning and applied models
...Show More Authors

It is no secret to anyone the lofty classifications and wonderful investigations made by Muslim scholars in various eras, with which they removed the dust of ignorance from the nation, clarified the argument, and illuminated the path of education, especially in the legal sciences, which are the foundation of religion.

It is the life of hearts and the path of grammarians in this world and the hereafter.

Among those scientific classifications are the investigations they have written in the science of the principles of legislation, which have established the general evidence and the original rules to which practical legal rulings are referred. And as you know, it is the basis of Islamic jurisprudence, a means of knowing its

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Scheduling of Leaching Requirements to Prevent the Secondary Salinisation in the Root Zone
...Show More Authors

Leaching scheduling techniques are one of the suggested solutions for water scarcity problems .The aim of the study is to show the possibility of using leaching scheduling, when applying the irrigation scheduling program for a certain irrigation project, which was prepare by Water Resources Engineering –University of Baghdad with some modifications to generalized it and it make applicable to various climatic zone and different soil types.
The objectives of this research is to build a system that concerns the prediction of the leaching scheduling (depth and date of leaching water), illustrating the main problems (soil salinity, save the amount of leaching requirement, and to maintain crops growth).The other objective is to compare be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Parallel Particle Swarm Optimization Algorithm for Identifying Complex Communities in Biological Networks
...Show More Authors

    Identification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 01 2013
Journal Name
International Journal Of Electrical, Electronics And Telecommunication Engineering
Performance Analysis of xPON Network for Different Queuing Models
...Show More Authors

Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref