Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
This research aimed at identifying the factors that affecting in the recruitment of a teaching staff for the Massive Open Online Courses (MOOCs) in university teaching at the University of Khartoum. The descriptive method was followed. The questionnaire was used as a tool for data collection,, which was distributed directly to a sample of (181) respondent of the teaching staff members of the senate at University of Khartoum from those who were attend at the senate meeting No. (409) which was held on 22 August 2016 Of (272). The researcher followed for the distribution the chance method, where each questionnaire was distributed to each of a teaching staff from different faculties at the University of Khartoum, according to his willingness
... Show MoreThe most famous phenomena in the media administration, is the transfer of power, from the decision-makers inside the administration, especially those who occupy administrative positions by law, to those who enjoy a natural influence based on knowledge, skill and competence, especially on the psychological, political and social sides.
The old way of dividing the administration into heads and hands is no longer accepted, and the separation of thinking and work based on a traditional format has become rather refused.
Also, a chapter like this one might become a constant routine, but it doesn’t keep pace with the development of field concepts and practices of administrations. The logic of modern administration emphasizes th
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show More
There is a theoretical controversy in the books of Usul al-Fiqh, in the past and the present, about whether the ruling should be attached to its reason (al-Hikmah), or its apparent and stable cause (al-Illah). Looking at the practical cases of the jurists, we found them sometimes attaching rulings to its reason, and sometimes to its cause, so there is a need to know the factors that affect their choices. By extrapolation, the researcher reached at nine factors that affect referring the ruling to its cause or to its reason in jurisprudential cases.
Diyala Governorate was exposed recently to high flood waves discharged from Hemrin Dam to Diyala River when the dam reached its full capacity. The recently recorded discharge capacity of Diyala River was reduced to just 750m3/s. This exposes cities and villages along the Diyala River to flood risk when discharging the flood waves, which may reach 3000 m3/s. It is important to manage, suggest, and design flood escapes to discharge the flood waves from Hemrin Dam away from Diyala River. This escape branches from Hemrin Lake towards Ashweicha Marsh. One dimensional hydraulic model was developed to simulate the flow within the escape by using HEC-RAS software. Eighty-two cross-sections were ext
... Show Mores The study aims to identify the fairness in the distribution of municipal services between municipal districts and areas, from point of view of municipal chamber staff and from the point of view of the citizen. It also aims to identify factors affecting the fairness of the distribution of municipal services. Municipal services were being studied : hygiene and waste, water supply, sewer, creating gardens, and street paving .Factors which examined its impact on municipal services are: resources available to municipal chamber, the managerial process at municipal chamber, and factors in the external environment surrounding municipal chamber.The results of the study showed that level of the e
... Show MoreBackground: Penetrating Neck Injuries (PNI) management represents a challenge to most surgeons in civilian trauma, in weighing selective versus mandatory exploration of all cases in different circumstances. Data are encouraging surgeons to adopt the former approach.Objectives: The study aims to assess the selective approach in our war and terror time events in Al-Yarmouk teaching hospital.Type of the study:A retrospective study. Methods: Data of patients presented to the Thoracic and Vascular ward in Al-Yarmouk teaching hospital with PNI were assessed retrospectively, from March 2013 to March 2015, and analyzed for epidemiology, mechanism of trauma, management methods, associated organ injuries, complications and mortality. Results: Amon
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More