Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Marriage outside the court is a manifestation of the oppression that women are subjected to in Iraq its seriousness comes out of the consequences that it leads to The. It overlooks the age of the girl and her marriage in younger age or coerced to marry as it leads to neglecting the affordability of marital relationship as long as the marriage does not have any legal or material consequences. The present study aims to detect Characteristics of both wives, husbands and families Who agree to marry her daughters outside the court. And the reasons that lead them to marry outside the courts. It also aims to provide information on the circumstances of marriage and reasons for refusing to ratify it in court. The study was based on the sample soc
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreIn this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted in the theoretical cross section and compared with the experimental data for nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi
... Show MoreThe study of the relationship between the coordinates of the sun and the moon with the crescent visibility factors has not been previously treated in a detailed and accurate way in research and previous studies, despite its religious importance. Accordingly, this paper aims to study the relationship between the crescent visibility factors (age, lag time, elongation (ARCL), arc of vision or relative altitude (ARCV), relative azimuth (DAZ), and crescent width (W), with coordinates of the sun and the moon), and how it varies during the day of the crescent's observation. In this paper, Matlab programs were designed to calculate the ecliptic sun and moon coordinates (λ, β) and in the presence of all perturbation impacts (planets), th
... Show MoreThe aimed of the research was recognize the Big five personality factors and Academic procrastination among Baghdad university students, recognized differences between the gender according to Big five personality factors and Academic procrastination , to recognized differences between specialization (scientific, human), and to recognize the relationship Between the variables of the research, and the extend of contribution Big five personality factors in Academic procrastination , to achieve these aims , Adopt scale to measure the Big five personality factors for (John Danahue & Kentle) , As we as the preparation of scale Based on An amber of previous scales to measure Academic procrastination, After processing the data st
... Show MoreAn Expression for the transition charge density is investigated
where the deformation in nuclear collective modes is taken into
consideration besides the shell model transition density. The
inelastic longitudinal C2 and C4 form factors are calculated using
this transition charge density for the Ne Mg 20 24 , , Si 28 and S 32
nuclei. In this work, the core polarization transition density is
evaluated by adopting the shape of Tassie model togther with the
derived form of the ground state two-body charge density
distributions (2BCDD's). It is noticed that the core polarization
effects which represent the collective modes are essential in
obtaining a remarkable agreement between the calculated inelastic
longi
Inelastic longitudinal electron scattering form factors have been calculated for isoscaler transition
T = 0 of the (0+ ®2+ ) and (0+ ®4+ ) transitions for the 20Ne ,24Mg and 28Si nuclei. Model
space wave function defined by the orbits 1d5 2 ,2s1 2 and 1d3 2 can not give reasonable result for
the form factor. The core-polarization effects are evaluated by adopting the shape of the Tassie-
Model, together with the calculated ground Charge Density Distribution CDD for the low mass 2s-1d
shell nuclei using the occupation number of the states where the sub-shell 2s is included with an
occupation number of protons (a ) .
The aim of this research is to determine the most important and main factors that lead to Preeclampsia. It is also about finding suitable solutions to eradicate these factors and avoid them in order to prevent getting Preeclampsia. To achieve this, a case study sample of (40) patients from Medical City - Oncology Teaching Hospital was used to collect data by a questionnaire which contained (17) reasons to be investigated. The statistical package (SPSS) was used to compare the results of the data analysis through two methods (Radial Bases Function Network) and (Factorial Analysis). Important results were obtained, the two methods determined the same factors that could represent the direct reason which causes Preecla
... Show MoreConcealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant b
... Show More