Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Background: Childhood meningitis is a major
cause of morbidity and mortality, Hemophilus
influenza b (Hib) is the most common cause in
many countries, especially below 5 years and
before the development of conjugated Hib vaccine,
it is followed by Streptococcus Pneumonia, and
then N. meningitides, in addition to other
microorganisms.
Objective: To identify the causative organisms
of bacterial meningitis and to identify the factors
predisposing significantly to the incidence of
bacterial meningitis.
Method: This cross sectional , study was done in
Al-Elwia Pediatric Hospital during the period 1st
of January 2007 to 30th of June 2007.Eighty four
patients with presumptive diagnosis of meningitis<
The Fylex extract exert a high inhibition effect against A . flavus growth on PDA medium, as the fungus growth was completely inhibited by 100% at a concentration of 0.2 and 0.3% of studied extract, while the lowest inhibition percentage (71%) was found at a concentration of 0.1%. Whereas magnesium oxide nanoparticles showed the highest inhibition ratio of A. flavus (100%) was detected at 0.2% and the lowest inhibition ratio (81.66%) was at concentration 0.5%. Moreover, the addition of G. lucidum powder to PDA medium with a concentration of 2.5 mg increased the inhibition rate of A. flavus growth which was 54.4%, while the lowest inhibition ration (18.22%) was found at a concentration of 1000 mg. The milky liquid (brocade milk) of Calotropi
... Show MoreAbstract
This study aims to identify the most prominent factors that lead to bullying of students with intellectual disabilities in primary and middle schools from the perspectives of special education teachers. A quantitative descriptive approach was utilized. A questionnaire was used as a tool for data collection. The sample consisted of (72) male and female teachers from the Asir region in the Kingdom of Saudi Arabia. The results revealed the most prominent factors that lead to bullying as follows: factors associated with the school and its policies, factors associated with peers, factors associated with students with intellectual disabilities, and factors associated with general education teachers. The findin
... Show MoreThis research aims to identify the factors effecting the investigation of insurance fraud from the perspective of the National Insurance Company employees, by analyzing the study variables and make recommendations on how to enhance the company and employees performance, and to achieve the objectives of the study and test hypotheses a questionnaire was designed after referring to the international standards and the 1969 Iraqi punishment law, and it was answered by 20 employees that were approved for the purposes of this research and analysis.
The study found that lack of employee training was a strong factor, while the supervisory staff and operational procedures was a weak one.
G
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreAbstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.
Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t
... Show MoreThe Machine learning methods, which are one of the most important branches of promising artificial intelligence, have great importance in all sciences such as engineering, medical, and also recently involved widely in statistical sciences and its various branches, including analysis of survival, as it can be considered a new branch used to estimate the survival and was parallel with parametric, nonparametric and semi-parametric methods that are widely used to estimate survival in statistical research. In this paper, the estimate of survival based on medical images of patients with breast cancer who receive their treatment in Iraqi hospitals was discussed. Three algorithms for feature extraction were explained: The first principal compone
... Show More