Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
In this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThis study was set out to investigate factors affecting labor productivity on construction in the north of Iraq (Kurdistan) and to rank all the factors based on engineers, contractors, and designer’s opinions. 76 factors were analyzed based on previous literature and a pilot study. Next, by using online Google Form, a questionnaire form was created and sent to people who have experience in the construction industry. Afterward, the questionnaire form was sent to targeted people by email and social media apps. Factors were divided into nine groups “Management, Technical and Technology, Human and Workforce, Leadership, Motivation, Safety, Time, Material and Equipment, and External”. However, 202 respondents participated in this study,
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe aim of this research is to study the factors affecting drag coefficient (C d ) in
non-Newtonian fluids which are the rheological properties ,concentrations of non-
Newtonian fluids, particle shape, size and the density difference between particle and
fluid .Also this study shows drag coefficient (C d ) and particle Reynolds' number (Re
P ) relationship and the effect of rheological properties on this relationship.
An experimental apparatus was designed and built, which consists of Perspex pipe
of length of 160 cm. and inside diameter of 7.8 cm. to calculate the settling velocity,
also electronic circuit was designed to calculate the falling time of particles through
fluid.
Two types of solid particles were
A simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected opti
... Show MoreA simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected optimum conditions,
... Show MoreRaising children occupies a prominent place in Islam as a step paving the way for the success of reform projects on the level of diverse human life, and for this reason the recommendation for education was mentioned in the mission entrusted to the Prophet (PBUH), the Almighty said:
(( هُوَ الَّذِي بَعَثَ فِي الْأُمِّيِّينَ رَسُولًا مِّنْهُمْ يَتْلُو عَلَيْهِمْ آيَاتِهِ وَيُزَكِّيهِمْ وَيُعَلِّمُهُمُ الْكِتَابَ وَالْحِكْمَةَ وَإِن كَانُوا مِن قَبْلُ لَفِي ضَلَالٍ مُّبِينٍ)) Jumaa verse /38
The topic of the research that is in your hands deals with the
... Show MoreThe reason for conducting this study is to prolong release of miconazole in the ocular site of action by ocular-based gels (OBGs) formulations. The formulation factors affecting on the release from OBG should be studied using various gelling agents in various concentrations to achieve the improvement in retention and residence time in response to prolonged release. In this study, the formulations were prepared using carbopol 940, pectin, sodium alginate, poloxamer 407, and poly(methacrylic acid) at 0.5%, 1%, and 1.5% w/v, respectively. Hydroxypropyl methylcellulose E5 (HPMC E5) 1% was added as thickening agent/viscosity builder. The formulation containing carbopol 940, pectin and sodium alginate at 1.5% w/v, displayed a noticable im
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show More