Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In this article, a summary of heuristic and meta-heuristic methods for solving the task scheduling optimization in cloud-fog systems is presented. The cost and time aware scheduling methods for both bag of tasks and workflow tasks are reviewed, discussed, and analyzed thoroughly to provide a clear vision for the readers in order to select the proper methods which fulfill their needs.
Single-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant perform
... Show MoreThis paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MoreTo ensure that a software/hardware product is of sufficient quality and functionality, it is essential to conduct thorough testing and evaluations of the numerous individual software components that make up the application. Many different approaches exist for testing software, including combinatorial testing and covering arrays. Because of the difficulty of dealing with difficulties like a two-way combinatorial explosion, this brings up yet another problem: time. Using client-server architectures, this research introduces a parallel implementation of the TWGH algorithm. Many studies have been conducted to demonstrate the efficiency of this technique. The findings of this experiment were used to determine the increase in speed and co
... Show MoreStatistical methods of forecasting have applied with the intention of constructing a model to predict the number of the old aged people in retirement homes in Iraq. They were based on the monthly data of old aged people in Baghdad and the governorates except for the Kurdistan region from 2016 to 2019. Using BoxJenkins methodology, the stationarity of the series was examined. The appropriate model order was determined, the parameters were estimated, the significance was tested, adequacy of the model was checked, and then the best model of prediction was used. The best model for forecasting according to criteria of (Normalized BIC, MAPE, RMSE) is ARIMA (0, 1, 2)
Statistical methods of forecasting have applied with the intention of constructing a model to predict the number of the old aged people in retirement homes in Iraq. They were based on the monthly data of old aged people in Baghdad and the governorates except for the Kurdistan region from 2016 to 2019. Using Box-Jenkins methodology, the stationarity of the series was examined. The appropriate model order was determined, the parameters were estimated, the significance was tested, adequacy of the model was checked, and then the best model of prediction was used. The best model for forecasting according to criteria of (Normalized BIC, MAPE, RMSE) is ARIMA (0, 1, 2).
This research deals with the role of Qur’anic intents in facilitating and facilitating the understanding of the reader and the seeker of knowledge of the verses of the Holy Qur’an, particularly in the doctrinal investigations (prophecies), and the feature that distinguishes reference to the books of the intentions or the intentional interpretations is that it sings from referring to the books of speakers and delving into their differences in contractual issues and facilitating access To the meanings, purposes and wisdom that the wise street wanted directly from the rulings and orders contained in the verses of the wise Qur’an.
In this paper, a self-tuning adaptive neural controller strategy for unknown nonlinear system is presented. The system considered is described by an unknown NARMA-L2 model and a feedforward neural network is used to learn the model with two stages. The first stage is learned off-line with two configuration serial-parallel model & parallel model to ensure that model output is equal to actual output of the system & to find the jacobain of the system. Which appears to be of critical importance parameter as it is used for the feedback controller and the second stage is learned on-line to modify the weights of the model in order to control the variable parameters that will occur to the system. A back propagation neural network is appl
... Show MoreAA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show More