Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
The bound radial wave functions of Cosh potential which are the solutions to the radial part of Schrodinger equation are solved numerically and used to compute the size radii; i.e., the root-mean square proton, neutron, charge and matter radii, ground density distributions and elastic electron scattering charge form factors for nitrogen isotopes 14,16,18,20,22N. The parameters of such potential for the isotopes under study have been opted so as to regenerate the experimental last single nucleon binding energies on Fermi's level and available experimental size radii as well.
The organization uses many techniques and methods to ensure that they will succeed and adapted with velocity change in the internal and external environment by decision taking, especially strategic decisions.
Strategic decisions are very important for organization success because it can predict the future and deal with uncertainty, in this circumstances they need accurate and comprehensive information to make effective strategic decision.
To achieve that purpose it must owned successful Strategic Information System ( SIS ) and determined the critical success factors for this system ,which can assisted the worker to focus on the important activities to develop it.
... Show MoreTo identify and explore the factors nurses perceive as influencing their knowledge acquisition in relation to diabetes care and its management in Saudi Arabia.
Diabetes continues to pose major healthcare challenges despite advances in diabetes management. Nurses have a crucial role in diabetes care, but diabetes knowledge deficits deter effective collaboration with other healthcare providers in educating patients about diabetes self‐management.
An exploratory descriptive qualitative design.
The nucleon momentum distributions (NMD) for the ground state and elastic electron scattering form factors have been calculated in the framework of the coherent fluctuation model and expressed in terms of the weight function (fluctuation function). The weight function has been related to the nucleon density distributions of nuclei and determined from theory and experiment. The nucleon density distributions (NDD) is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of long-tail behavior at high momentum region of the NMD has been obtained using both the theoretical and experimental weight functions. The observed ele
... Show MoreAn effective two-body density operator for point nucleon system folded with two-body correlation functions, which take account of the effect of the strong short range repulsion and the strong tensor force in the nucleon-nucleon forces, is produced and used to derive an explicit form for ground state two-body charge density distributions (2BCDD's) and elastic electron scattering form factors F (q) for 19F, 27Al and 25Mg nuclei. It is found that the inclusion of the two-body short range correlations (SRC) has the feature of reducing the central part of the 2BCDD's significantly and increasing the tail part of them slightly, i.e. it tends to increase the probability of transferring the protons from the central region of the nucleus towards
... Show MoreAdhesion (type 1 fimbriae) and host defense avoidance mechanisms (capsule or lipopolysaccharide) have been shown to be prevalent in Escherichia coli isolates associated with urinary tract infections. In this work, 50 uropathogenic Escherichia coli (UPEC) isolated from children with urinary tract infections were genotypically characterized by polymerase chain reaction (PCR) assay. We used two genes; fimH and kpsMTII, both of them previously identified in uropathogenic E.coli (UPEC) isolates. The PCR assay results identified fimH (90.0)% and kpsMTII (72.0)% isolates. In the present study, was also demonstrated that these genes may be included in both or one of them within a single isolate.
This paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreThis study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show More