Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show MoreCarbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h
... Show MoreThis paper represents an experimentalattempt to predict the influence of CO2-MAG welding variables on the shape factors of the weld joint geometry. Theinput variables were welding arc voltage, wire feeding speed and gas flow rate to investigate their effects on the shape factorsof the weld joint geometry in terms of weld joint dimensions (bead width, reinforcement height, and penetration). Design of experiment with response surface methodology technique was employed to buildmathematical models for shape factors in terms of the input welding variables. Thepredicted models were found quadratic type and statistically checked by ANOVA analysis for adequacy purpose. Also, numerical and graphical optimizations were carried out
... Show MoreThe aim of the research is to measure the change in the impact of the factors of the Corona pandemic on psychological sensitivity and COVID-19 phobia in a sample of Bisha University students and to detect the differences in the phobia (phobia) Covid-19 among the sample members in the measurement before the ban and after the ban was opened, in addition to the differences in psychological sensitivity of The sample has between sizes before and after the spread of the Corona pandemic, as well as the differences in them according to the gender variable (male, female). The researcher relied on the comparative approach. The scale of psychological sensitivity and COVID-19 phobia was applied to a sample of (62) male and female respondents.
... Show MoreHeart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac
... Show MoreCloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreSAGD is a thermal recovery process in which steam oil ratio, SOR, is a key parameter that can affect the economic outcome of the process. Reservoirs with underlying or overlying lean bitumen present challenges for SAGD as they can act as a heat sink. Water has higher heat capacity than the bitumen and thus requires more steam to heat up the reservoir leading to higher SOR. The potential outcome of operating SAGD in these conditions may be lower bitumen rate and higher steam injection rate, both of which affect plant throughput and thus the economic matrix of SAGD. This paper looks at the performance of SAGD process in the presence of top lean bitumen. It will examine the theoretical CSOR that is needed to produce the bitumen with different
... Show More