Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Thin films of Nb2O5 have been successfully deposited using the DC reactive magnetron sputtering technique to manufacture NH3 gas sensors. These films have been annealed at a high temperature of 800°C for one hour. The assessment of the Nb2O5 thin films structural, morphological, and electrical characteristics was carried out using several methods such as X-ray diffraction (XRD), atomic force microscopy (AFM), energy-dispersive X-ray spectroscopy (EDS), Hall effect measurements, and sensitivity assessments. The XRD analysis confirms the polycrystalline composition of the Nb2O5 thin films with a hexagonal crystal structure. Furthermore, the sensitivity, response time, and recovery time of the gas sensor were evaluated for the Nb2O5 thin film
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
Two different composite materials were prepared by stir casting method of AA 6061 alloy as a matrix reinforced with two addition different ceramic materials Al2O3 and B4C of grain size 20 µm by 2.5, 5, 7.5 and10% in weight. The composite material with aluminum alloy as a matrix possesses a unique mechanical properties such as: high specific strength and hardness, low density, and high resistance to corrosion and friction wear. This composite is widely used in automotive parts space and marine applications.
Pin-on-disc technique was used to calculate the wear rate for each addition of Al2O3 and B4C particles. Rockwell hardness test and
... Show MoreBackground: Obesity is becoming the healthcare epidemic world wide.Obesity is associated with reduced life expectancy, increased morbidity and mortality, and greater healthcare costs.Bariatric surgery is the only effective treatment for morbid obesity and is gaining increasing popularity. There has been a steady rise in the numbers and types of bariatric operations done worldwide in recent years butnon of prove to be ideal .Animal studies and use of animal models are significant element in the evolution of medical knowledge and the use of animals as a model for bariatric surgery is of importance to study the mechanisms of these operationsa and also help to develop new technique in management of obesity.Objectives:Study of effects of slee
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show More