Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Evaluation was carried out on the existing furrow irrigation system located in an open agricultural field within Hor Rajabh Township, south of Baghdad, Iraq (latitude: 33°09’ N, longitude: 44°24’ E). Two plots were chosen for comparison: treatment plot T1, which used subsurface water retention technology (SWRT) with a furrow irrigation system. While the treatment plot T2 was done by using a furrow irrigation procedure without SWRT. A comparison between the two treatment plots was carried out to study the efficiency of the applied water on crop yield. In terms of agricultural productivity and water use efficiency, plot T1 outperformed plot T2, according to the study’s final fin
Transportability refers to the ease with which people, goods, or services may be transferred. When transportability is high, distance becomes less of a limitation for activities. Transportation networks are frequently represented by a set of locations and a set of links that indicate the connections between those places which is usually called network topology. Hence, each transmission network has a unique topology that distinguishes its structure. The most essential components of such a framework are the network architecture and the connection level. This research aims to demonstrate the efficiency of the road network in the Al-Karrada area which is located in the Baghdad city. The analysis based on a quantitative evaluation using graph th
... Show MoreThe current research aims to prepare a proposed Programmebased sensory integration theory for remediating some developmental learning disabilities among children, researchers prepared a Programme based on sensory integration through reviewing studies related to the research topic that can be practicedby some active teaching strategies (cooperative learning, peer learning, Role-playing, and educational stories). The Finalformat consists of(39) training sessions.
In this research we have been studied the 3rd order spherical aberration for an optical system consisted of obscured circular aperture with non central circular obscuration through the calculation of point spread function (P.S.F) in presence of the obscuration in the center and comparing the obtained results with that results of moving obscuration far away from the center, where the results showed significant improvement for(P.S.F) value. The study was done of different obscurities ratios in addition to the different 3rd order spherical aberration values (W40=0.25 ,0.5 ,0.75 ,1 ).
The settlement evaluation for the jet grouted columns (JGC) in soft soils is a problematic matter, because it is influenced by the number of aspects such as soil type, effect mixture between soil and grouting materials, nozzle energy, jet grouting, water flow rate, rotation and lifting speed. Most methods of design the jet-grouting column based on experience. In this study, a prototype single and group jet grouting models (single, 1*2, and 2*2) with the total length and diameter were (2000 and 150 mm) respectively and clear spacing (3D) has been constructed in soft clay and subjected to vertical axial loads. Furthermore, different theoretical methods have been used for the estimation
The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi
... Show MoreTen isolates of Klebsiella pneumoniae, seven isolates of Pseudomonas aeruginosa and nine isolates of Staphylococcus aureus, were obtained from 100 urine samples collected from Baghdad hospitals. All isolates were identified biochemically and confirmed by using VITEK 2 and were then tested for their susceptibility towards 6 antibiotics and for phenolic extracts of Thymus vulgaris and Cinnamomum cassia. All bacteria were greatly affected by T. vulgaris, especially K. pneumoniae. Viable count was performed, it was noted that the number of bacterial cells reduced from 1×108 CFU to 1.2× 103, 2×105 and 1.8×106CFU of K. pneumoniae, P. aeruginosa and S. aureus respectively. While C. cassiahad a slight effect on them. K. pneumoniae isola
... Show More