nabaz nawzad

By

Abstract: Cloud computing enables cloud providers to outsource their Information Technology (IT) services from data centers in a pay-as-you-go model. However, Cloud infrastructure comprises virtualized physical resources that consume huge amount of energy and emits carbon footprints to environment. Hence, there should be focus on optimal assignment of Virtual Machines (VM) to Physical Machines (PM)...
Read More
Abstract: No doubt translation studies can be considered as one of the most abstract and complex phenomenon, simply, because translation itself is the output of the abstractness of the mind of the speaker, writer, sender, addressor. As it is well-known, translation has been viewed differently due to its nature. It has been viewed in terms...
Read More
Abstract: research is to clarify the age of juveniles, highlight the concept of juvenile felony, the provisions and penalties from the perspective of Islamic jurisprudence, the treatment of preventive and curative measures, the factors driving them to commit crime. Juvenile felony emerged as a result of multiple factors in the life of juveniles that prompted...
Read More
Abstract: This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of the techniques used in text steganography. This paper aims to identify the main techniques of text steganography, which are feature-based, and word-rule based, to recognize the various techniques...
Read More
Abstract: The main consideration of Mobile WiMAX is to achieve seamless handover such that there is no loss of data. In WiMAX both mobile station (MS) and a base station (BS) scans the neighboring base stations for selecting the best base station for a potential handover. This paper presents an analysis of the particularities of...
Read More
Abstract: With the huge growth of the critical data that saved in the cloud, the security of the cloud should be safer. The growing of the cloud users attended with the rising of the harmful attacks and natural processes. Many weaknesses and security advisories are discovered. The idea of using the cloud is not considered...
Read More
Abstract: Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this study is explore the...
Read More
Abstract: The self-similar network traffic can have a detrimental impact on network performance, including amplified queuing delay, retransmission rate and packet loss rate. Modern network traffic consists of more bursts than Poisson models predict over many time scales. This difference has implications for performance. The video traffic research is important because self-similar nature of network...
Read More
Abstract: Small and medium-sized enterprises (SMEs) have made significant contributions to the economic development of the country and the creation of new jobs. This results in the creation of revenue, the contribution of social activities, and the reduction of poverty. The progress of technology has a significant influence on people and places all over the...
Read More
Abstract: In the contemporary techno world the role of a teacher is multi challenged. The role of the teacher is challenged, as the students of present age are gathering ideas from all around. The students are expected to be an all-rounder in every walks of their life. Thus, the role of a successful teacher in...
Read More
1 14 15 16 17 18 19

Recent Comments