Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
The study aimed to identify the role of public relations management in its dimensions (mental image, media, advertising, and the public) on green human resource management practices in Jordanian private hospitals in Amman, and this study relied on the quantitative approach (descriptive and analytical) to test hypotheses. Where the questionnaire was relied upon to collect data and their number was (1771) workers, and the study population consisted of workers in the hospitals that were studied on them and their number was 10 hospitals, where 316 questionnaires were distributed, 300 questionnaires were retrieved, and 16 questionnaires were not valid for analysis. That is, 91.7% of the sample, and the study relied on proportional stratified
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show MoreBackground: Wound healing, as a normal biological process in the human body, is achieved through four precisely and highly programmed phases: hemostasis, inflammation, proliferation, and remodeling. Growth factors released in the traumatized area promote cell migration into the wound area (chemotaxis), stimulate the growth of epithelial cells and fibroblasts (mitogenesis), initiate the formulation of new blood vessels (angiogenesis), and stimulate matrix formation and remodeling of the affected region. One of factors that effects on wound healing is a sex hormones and one of these hormones is an estrogen hormone. A wide range of cutaneous cell types (eg, fibroblast, endothelial, epithelial, and inflammatory) expressed estrogen receptors, in
... Show MoreSince the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th
... Show MoreThe importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreAccurate description of thermodynamic, structural, and electronic properties for bulk and surfaces of ceria (CeO2) necessitates the inclusion of the Hubbard parameter (U) in the density functional theory (DFT) calculations to precisely account for the strongly correlated 4f electrons. Such treatment is a daunting task when attempting to draw a potential energy surface for CeO2-catalyzed reaction. This is due to the inconsistent change in thermo-kinetics parameters of the reaction in reference to the variation in the U values. As an illustrative example, we investigate herein the discrepancy in activation and reaction energies for steps underlying the partial and full hydrogenation of acetylene over the CeO2(111) surface. Overall, we find th
... Show MoreThe research aims to measure and analyze the reality of liquidity in the Rasheed Bank and determine their impact on risk and return in order to identify the extent of the efficiency of the management of liquidity by the Bank and how to employ them in a profitable investment areas, and analysis of the compatibility of the liquidity gap and gap the balance sheet (sensitive interest rate) and affected net interest Change prices, and through the adoption of style ladder recommended Meritassets and liabilities by the Central Bank of Iraq, as it is an important and vital aspects in commercial banks' management, when there is a commonly used optimizing the resources of the bank available, it means that there is a banking efficient management is
... Show MoreThe research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the imensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.The research started from the problem of exposure of the Iraqi tax system to several changes, as this led to a reflection on the technical organization of taxes, in terms of the tax rate.The descriptive analytical approach was chosen to study the actual reality of th
... Show MoreThe parasite E.histolytica was first isolated from a stool sample, and then cultivated and maintained in vitro using Locke-egg medium (LEM) and Liver infusion agar medium (LIAM) . Then, the effect of some types of erythrocytes (human and sheep), on the growth and activity of the parasite in the two culture media was investigated. The parasite was able to ingest and lysis erythrocytes of human and sheep that were supplemented to the culture media and such manipulation was able to augment the reproduction rate of the cultivated E. histolytica, however, such consequence was media- and concentration-dependent. The reproduction rate was significantly increased (66.0, 57.5 and 58.6%, respectively) in LEM medium containing human erythrocytes ty
... Show More