Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Farmers keep trying to avoid using chemical fertilizer without losing high yield. A field experiment was conducted in the fields of Agriculture College, University of Baghdad during winter seasons of 2015 and 2016 to investigate the response of three bread wheat (Triticum aestivum L.) cultivars (Ibaa99, Abu-Ghraib3 and Buhooth22) to the frequency of spraying with biofertilizer (EM-1) (one time at tillering stage, twice at tillering and stem elongation stages and three times at tillering, stem elongation and booting stages) in addition to the control (without spraying), to the increase of grain yield. Randomized complete block design (RCBD), in split plots arrangement and four replications, was used. Spraying treatments were placed as main p
... Show MoreVitamin D is a fat-soluble vitamin with antioxidant and DNA protecting properties , Levofloxacin is a member of the fluoroquinolone drug class, Its broad-spectrum bactericidal effect affects both Gram-positive and Gram-negative bacteria.
The goal of the study is to analyze the haematology analysis in rats received levofloxacin and show the preventive impact of vitamin D3 by analyzing the haematology parameters: packed cell volume (PCV), mean corpuscular hemoglobin concentration(MCHC),haemoglobin (HB), red blood cell (RBC), mean corpuscular volume (MCV),meancorpuscular haemoglobin(MCH), WBC ,differential WBC, and Platelets.
The study included 42 rats divided into 6 groups each group 7 rats. group I negative control
... Show MoreThe increasing use of plastics in various aspects of modern life resulted in the availability of enormous amount of wastes, including a negative effect on the environment and humans. So it is necessary to find solutions to deal with these wastes and ensure to use them as solutions to use in concrete mix . In this research the production of concrete containing high and low density polyethylene has been used by (5, 10, 15)% as a replacement of part of the volume of sand, so as to obtain concrete good compressive strength as well as other benefits such as improved possibility of pumping concrete and reduce the loss of concrete for workability polymer is a material that is non-absorbable of water . It is also intended to dispose of these was
... Show MoreHuman health was and still the most important problem and objective of all most researches. Finding out what causes in the decadence of healthiness of Iraqi population is our tendency in the present work, Uranium causing cancer that is affected by a correlation between age and gender of bladder cancer patients is studied in the present work. Mean of Uranium concentration (Uc) decreased with increasing age for all age group without dependency on gender. While, there is a wide dispersion in Mean Uc excretion between males and females, due to the effect of correlated gender with age, where female Mean Uc is maximum at age 50-69 year (2.355 µg/L), and it's higher than male Mean Uc (2.022 µg/L) in this age stage because of menopause, a
... Show MoreFor the most reliable and reproducible results for calibration or general testing purposes of two immiscible liquids, such as water in engine oil, good emulsification is vital. This study explores the impact of emulsion quality on the Fourier transform infrared (FT-IR) spectroscopy calibration standards for measuring water contamination in used or in-service engine oil, in an attempt to strengthen the specific guidelines of ASTM International standards for sample preparation. By using different emulsification techniques and readily available laboratory equipment, this work is an attempt to establish the ideal sample preparation technique for reliability, repeatability, and reproducibility for FT-IR analysis while still considering t
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More