Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreThe investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti
... Show MoreBackground: Acute radiodermatitis is a common side effect during and after radiotherapy course in breast cancer patients treated by radiotherapy. This study assess the frequency of acute radiodermatitis and record the predictive factors for acute radiodermatitis. Patients and Methods: A descriptive case series study conducted at Baghdad, Iraq from August 2020 to September 2021. 70 female scheduled for radiotherapy sessions enrolled in this study. sociodemographic data were recorded and Skin examination before radiotherapy and weekly till the end of the radiotherapy sessions was done to report the frequency, risk factors, clinical picture and grades of acute radiodermatitis based on The National Cancer Institute’s Common Terminology Crite
... Show MoreThe two-frequency shell model approach is used to calculate the
ground state matter density distribution and the corresponding root
mean square radii of the two-proton17Ne halo nucleus with the
assumption that the model space of 15O core nucleus differ from the
model space of extra two loosely bound valence protons. Two
different size parameters bcore and bhalo of the single particle wave
functions of the harmonic oscillator potential are used. The
calculations are carried out for different configurations of the outer
halo protons in 17Ne nucleus and the structure of this halo nucleus
shows that the dominant configuration when the two halo protons in
the 1d5/2 orbi
Summary The aim of this study is the evaluation the resistance of S. marcescence obtained from soil and water to metals chlorides (Zn+2, Hg+2, Fe+2, Al+3, and Pb+2). Four isolates, identified as Serratia marcescence and S. marcescena (S4) were selected for this study according to their resistance to five heavy metals. The ability of S. marcescena (S4) to grow in different concentrations of metals chloride (200-1200 µg/ml) was tested, the highest concentration that S. marcescence (S4) tolerate was 1000 µg/ml for Zn+2, Hg+2, Fe+2, AL+3, pb+2 and 300 µg/ml for Hg+2 through 24 hrs incubation at 37 Co. The effects of temperature and pH on bacteria growth during 72 hrs were also studied. S. marcescence (S4) was affected by ZnCl2, PbCl2, FeC12
... Show MoreThe charge density distributions of 10 B nucleus are calculated using the
harmonic oscillator wave functions. Elastic and inelastic electron scattering
longitudinal form factors have been calculated for the similar parity states of 10B
nucleus where a core of 4He is assumed and the remaining particles are
distributed over 3/ 2 1p and 1/ 2 1p orbits which form the model space.
Core-polarization effects are taken into account. Core-polarization effects are
calculated by using Tassie model and gives good agreement with the measured
data.
The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreA multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More