Preferred Language
Articles
/
bsj-3189
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual resource, by combining two types of algorithms: dynamic algorithm (adaptive firefly) and static algorithm (weighted round robin). The results show improvement in resource utilization, increased productivity, and reduced response time.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Furfural Degradation in Waste Water by Advanced Oxidation Process Using UV/H2O2
...Show More Authors

Furfural is one of the one of pollutants in refinery industrial wastewaters. In this study advanced oxidation process using UV/H2O2 was investigated for furfural degradation in synthetic wastewater. The results from the experimental work showed that the degradation of furfural decreases as its concentration increases, reaching 100% at 50mg/l furfural concentration and increasing the concentration of H2O2 from 250 to 500 mg/l increased furfural removal from 40 to 60%.The degradation of furfural reached 100% after 90 min exposure time using two UV lamps, where it reached 60% using one lamp after 240 min exposure time. The rate of furfural degradation k increased at the pH and initial concentratio

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Decolorization of Reactive Yellow Dye by Advanced Oxidation Using Continuous Reactors
...Show More Authors

The reactive yellow azo dye (λmax = 420 nm) is widely utilized for textile coloring due to its low-cost stability and tolerance properties. Treatment of dye-containing wastewater by traditional methods is usually inadequate because of its resistance to biological and chemical degradation. From this research, the continuous reactor of an advanced oxidation method supported the use of H2O2/TiO2/UV to remove the coloration of the reactive yellow dye from the discharge. At constant best conditions obtained from the batch reactor tests pH=7, H2O2 dosage = 400 mg/l and TiO2=25mg/l , the aqueous solutions were tested in the continuous reactor at different dye concentration and d

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Annals Of Medicine And Surgery
Plasma d-dimer level correlated with advanced breast carcinoma in female patients
...Show More Authors

View Publication
Scopus (10)
Crossref (11)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Industrial Policy and Development in Developing Countries (The Proponents and the Opponents
...Show More Authors

This paper aims to discuss and analyse the role and importance of implementing industrial Policy to promote industry and enhance economic development in developing countries. The paper discusses the economic justifications for using industrial policy as well as the criticisms leveled against it, for this purpose it analyses the ideas of two different approaches to industrial policy. The first held by the neo-liberals in the USA , who oppose the use of industrial policy and emphasise the role of the market in attaining economic development. The second, represented by many economists who support the use of industrial policy to promote industry and accelerate economic development, they justify their stand by pointing to the negative

... Show More
View Publication Preview PDF
Crossref