The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here in this research article, we present a comprehensive review of fog computing, differentiating it from cloud computing, also present various use-cases of fog computing in different domains, we came to conclude that Fog computing leads in an efficient energy resource management, leveraging the energy both in terms of consumption and cost scenarios. Further, we highlighted its key features, challenges and issues, resource optimization methods.
There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreThis work evaluates the economic feasibility of various production scenarios for the Zubair reservoir in the Kifl oil field using cash flow and net present value (NPV) calculations. The Kifl field is an exploratory field that has not yet been developed or assessed economically. The first well was drilled in 1960, and three other wells were later drilled to assess the oil accumulation, so in this research, Different production scenarios were evaluated economically. These scenarios were proposed based on the reservoir model of the Zubair formation in the field. The research methodology used QUE$TOR software to estimate capital expenditures (CapEx) and operating expenditures (OpEx) based on field-level data, production prof
... Show MoreThe Fauqi field is located about 50Km North-East Amara town in Missan providence in Iraq. Fauqi field has 1,640 MMbbl STOIIP, which lies partly in Iran. Oil is produced from both Mishrif and Asmari zones. Geologically, the Fauqi anticline straddles the Iraqi/Iranian border and is most probably segmented by several faults. There are several reasons leading to drilling horizontal wells rather than vertical wells. The most important parameter is increasing oil recovery, particularly from thin or tight reservoir permeability. The Fauqi oil field is regarded as a giant field with approximately more than 1 billion barrels of proven reserves, but it has recently experienced low production rate problems in many of its existing wells. This study
... Show MoreThis paper presents a comparative study between different oil production enhancement scenarios in the Saadi tight oil reservoir located in the Halfaya Iraqi oil field. The reservoir exhibits poor petrophysical characteristics, including medium pore size, low permeability (reaching zero in some areas), and high porosity of up to 25%. Previous stimulation techniques such as acid fracturing and matrix acidizing have yielded low oil production in this reservoir. Therefore, the feasibility of hydraulic fracturing stimulation and/or horizontal well drilling scenarios was assessed to increase the production rate. While horizontal drilling and hydraulic fracturing can improve well performance, they come with high costs, often accounting for up t
... Show MoreA study of the effects of the discharge (sputtering) currents (60-75 mA) and the thickness of copper target (0.037, 0.055 and 0.085 mm) on the prepared samples was performed. These samples were deposited with pure copper on a glass substrate using dc magnetron sputtering with a magnetic flux density of 150 gauss at the center. The effects of these two parameters were studied on the height, diameter, and size of the deposition copper grains as well as the roughness of surface samples using atomic force microscopy (AFM).The results of this study showed that it is possible to control the specifications of copper grains by changing the discharge currents and the thickness of the target material. The increase in discharge curre
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More