Preferred Language
Articles
/
-RboGYcBVTCNdQwCOTa1
Load balancing by dynamic BBU-RRH mapping in a self-optimised Cloud Radio Access Network
...Show More Authors

Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
(Dynamic& Static) Forecast of surplus or Deficit of Public budget in Iraq for (2017،2018)
...Show More Authors

 This research aims at forecasting the public budget of Iraq (surplus or deficit) for 2017 & 2018 through using two methods to forecast. First: forecast budget surplus or deficit by using IMF estimations average oil price per barrel adopted in the public federal budget amounted to USD 44 in 2017 & USD 46 in 2018; Second: forecast budget surplus or deficit by using MOO actual average oil price in global markets amounted to USD 66 in 2018 through applying Dynamic Model & Static Model. Then analyze the models to reach the best one. The research concluded that those estimations of dynamic forecasting model of budget surplus or deficit for 2017 & 2018 gives good reliable results for future periods when using the a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
NUMERICAL INVESTIGATION OF STATIC AND DYNAMIC STRESSES IN SPUR GEAR MADE OF COMPOSITE MATERIAL
...Show More Authors

In this current work, Purpose; to clearly the fundamental idea for constructing a design and
investigation of spur gear made of composite material its comes from the combination of (high
speeds, low noise, oil-les running, light weight, high strength, and more load capability)
encountered in modern engineering applications of the gear drives, when the usual metallic gear
cannot too overwhelming these combinations.
An analyzing of stresses and deformation under static and dynamic loading for spur gear tooth
by finite element method with isoparametric eight-nodded in total of 200 brick element with 340
nods in three degree of freedom per node was selected for this analysis. This is responsible for the
catastropic fa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 22 2026
Journal Name
Discover Public Health
Patients’ lived experiences, attitudes, and skills on insulin self-administration among diabetic patients: a cross-sectional study
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 23 2023
Journal Name
International Journal Of Mental Health Nursing
Self and public stigma towards mental illnesses and its predictors among university students in 11 Arabic‐speaking countries: A multi‐site study
...Show More Authors
Abstract<p>This study aimed to explore self and public stigma towards mental illness and associated factors among university students from 11 Arabic‐speaking countries. This cross‐sectional study included 4241 university students recruited from Oman, Saudi Arabia, the United Arab Emirates (UAE), Syria, Sudan, Bahrain, Iraq, Jordan, Lebanon, Palestine and Egypt. The participants completed three self‐administrative online questionnaires—Demographic Proforma (age, gender, family income, etc.), Peer Mental Health Stigmatization Scale and Mental Health Knowledge Questionnaire. There was a significant difference in the average mean between the 11 countries (<italic>p</italic> < 0.01) based on</p> ... Show More
View Publication
Scopus (11)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Measurement of self control among university Students
...Show More Authors

Self control is the perception of the individual of his duty at, the capacity of self testing in systematic durations and the ability of individuate to control his behavior, The control will be spontaneous when the individual will have a special ideas about the correct or incorrect behavior and choosing his way according it.
The present study airs at:
1- building and measuring self control and balancing among means among university students according to gender and specialization.
To achieve the above mention aim, the two researchers built a scale of self control depending on some theories and applying it on a sample consists of (400) male and female students in Baghdad university studying in scientific and human fields. The two

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Conceptual perspective of self-marketing Search descriptive
...Show More Authors

Basic orientation is to look at identifying conceptual perspective to market self-research and descriptive, as has the marketing theme for the same attention in the practical side before endo scopic In recent years, is marketing an integrated and holistic included many areas not limited to the marketing of goods and services, and even included the marketing of religion, politics and individuals for themselves, as the awareness and concepts that seep into the soul of man from its inception until his arrival to the stage of owning a level of skills or expertise, scientific or all of those things degrees mixed with ambition and aspiration for self-realization takes way to search for opportunities or created, often observe individual

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF