Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Iraq is located near the northern tip of the Arabian plate, which is advancing northwards relative to the Eurasian plate, and is predictably, a tectonically active country. Seismic activity in Iraq increased significantly during the last decade. So structural and geotechnical engineers have been giving increasing attention to the design of buildings for earthquake resistance. Dynamic properties play a vital role in the design of structures subjected to seismic load. The main objective of this study is to prepare a data base for the dynamic properties of different soils in seismic active zones in Iraq using the results of cross hole and down hole tests. From the data base collected it has been observed that the average ve
... Show MoreE-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreTensile strength is a critical property of Hot Mix Asphalt (HMA) pavements and is closely related to distresses such as fatigue cracking. This study aims to evaluate methods for assessing fatigue cracking in Asphalt Concrete (AC) mixes. In order to achieve optimum density at different binder contents, the mixes were compressed using a gyratory compactor. Tensile strength was assessed using the Indirect Tensile (IDT) and Semi-Circular Bend (SCB) tests. The results showed that the tensile strength measured by the SCB test was consistently higher than that measured by the IDT test at 25 °C. In addition, the SCB test showed a stronger correlation between increasing binder content and tensile strength. For binder contents ranging from 4
... Show MoreThe transverse electron scattering form factors have been studied for low –lying excited states of 7Li nucleus. These states are specified by J? T= (0.478MeV), (4.63MeV) and (6.68MeV). The transitions to these states are taking place by both isoscalar and isovector components. These form factors have been analyzed in the framework of the multi-nucleon configuration mixing of harmonic oscillator shell model with size parameter brms=1.74fm. The universal two-body of Cohen-Kurath is used to generate the 1p-shell wave functions. The core polarization effects are included in the calculations through effective g-factors and resolved many discrepancies with experiments. A higher configuration effect outside the 1p-shell model space, such
... Show MoreSurge pressure is supplemental pressure because of the movement of the pipes downward and the swab pressure is the pressure reduction as a result of the drill string's upward movement. Bottom hole pressure is reduced because of swabbing influence. An Investigation showed that the surge pressure has great importance for the circulation loss problem produced by unstable processes in the management pressure drilling (MPD) actions. Through Trip Margin there is an increase in the hydrostatic pressure of mud that compensates for the reduction of bottom pressure due to stop pumping and/or swabbing effect while pulling the pipe out of the hole. This overview shows suggested mathematical/numerical models for simulating surge pressure problems ins
... Show MoreWater supply projects (WSP) requires high plan information, specialized capabilities, capable human resources, and high administrative capacity. However, in the developing countries, particularly in Iraq, these projects experience a lack of a large number of these necessities, which shows the need to identify the critical success factors (CSFs). Accordingly, the objectives of this research are to investigate the CSFs for WSP and their significance among the construction (public and private) and education sectors. To achieve this, first we have carried out a comprehensive literature review of the CSFs for WSP. Second, we administrated a questionnaire survey to 260 construction experts
Abstract :
In view of the fact that high blood pressure is one of the serious human diseases that a person can get without having to feel them, which is caused by many reasons therefore it became necessary to do research in this subject and to express these many factors by specific causes through studying it using (factor analysis).
So the researcher got to the five factors that explains only 71% of the total variation in this phenomenon is the subject of the research, where ((overweight)) and ((alcohol in abundance)) and ((smoking)) and ((lack of exercise)) are the reasons that influential the most in the incidence of this disease.
Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show More