Preferred Language
Articles
/
JBfoV5MBVTCNdQwCIdFo
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fibrewise Fuzzy Topological Spaces
...Show More Authors

     We introduce and discuss the modern type of fibrewise topological spaces, namely fibrewise fuzzy topological spaces. Also, we introduce the concepts of fibrewise closed fuzzy topological spaces, fibrewise open fuzzy topological spaces, fibrewise locally sliceable fuzzy topological spaces and fibrewise locally sectionable fuzzy topological spaces. Furthermore, we state and prove several theorems concerning these concepts.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The norms of Minnesota multi faces personality inventory (second edition) MMPI-2 and the sixteen personality factor questionnaire of catel (fifth edition)
...Show More Authors

The aim of the current study is to create special norms of the second edition of Minnesota multi faces personality inventory, and the fifth edition of the sixteen personality factor questionnaire of catel. To this end, the researcher applied the Minnesota multi faces personality inventory over a sample of (1646) secondary and university students as well as plenty of disorders. She also applied the sixteen personality factor questionnaire of catel on (4700) secondary and university students. SPSS tools were used to process data.  

View Publication Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fibrewise Multi-Perfect Topological Spaces
...Show More Authors

The essential objective of this paper is to introduce new notions of fibrewise topological spaces on D that are named to be upper perfect topological spaces, lower perfect topological spaces, multi-perfect topological spaces, fibrewise upper perfect topological spaces, and fibrewise lower perfect topological spaces. fibrewise multi-perfect topological spaces, filter base, contact point, rigid, multi-rigid, multi-rigid, fibrewise upper weakly closed, fibrewise lower weakly closed, fibrewise multi-weakly closed, set, almost upper perfect, almost lower perfect, almost multi-perfect, fibrewise almost upper perfect, fibrewise almost lower perfect, fibrewise almost multi-perfect, upper* continuous fibrewise upper topol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
New Operational Matrices of Seventh Degree Orthonormal Bernstein Polynomials
...Show More Authors

Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the relationship between the degree of economic freedom and foreign trade of selected developing countries for the period (1990-2005) *
...Show More Authors

Is a high degree of economic freedom an important part in the development of the economies of developing countries in the last decade of the twentieth century and the beginning of the twentieth century and the atheist. This is because a test subject (deltoid analysis of the relationship between the degree of economic freedom and foreign trade of selected developing countries for the period
( 1990 -2005) to determine the degree of economic freedom in foreign trade promotion in Singapore and Turkey. The research recommends a number of  recommendations, the most important is the responsibility of the Ministry of Planning in Iraq that is providing the necessary data for the Fraser Institute, the aim of increasing cooperation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
On the Estimation of Stress-Strength Model Reliability Parameter of Power Rayleigh Distribution
...Show More Authors

      The aim of this paper is to estimate a single reliability system (R = P, Z > W) with a strength Z subjected to a stress W in a stress-strength model that follows a power Rayleigh distribution. It proposes, generates and examines eight methods and techniques for estimating distribution parameters and reliability functions. These methods are the maximum likelihood estimation(MLE), the exact moment estimation (EMME), the percentile estimation (PE), the least-squares estimation (LSE), the weighted least squares estimation (WLSE) and three shrinkage estimation methods (sh1) (sh2) (sh3). We also use the mean square error (MSE) Bias and the mean absolute percentage error (MAPE) to compare the estimation methods. Both theoretical c

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Design and Creating a Specific Neutron Irradiation Instrument to Decrease the User’s Radiation Exposure Time
...Show More Authors

      A specialized irradiation instrument "created instrument" was  designed and created from various kinds and sizes of available plastic household-waste materials. In addition, a neutron beam collimator with a lid was designed  and implemented. The collimator is with dimensions of 25 cm in height and 10 cm in inner diameter, while the lid dimensions are 11.5 cm height and outer diameter of 9.9 cm  to perfectly match the inner diameter of the collimator with the possibility of movement (opening and closing), and also the shielding of the radioactive 241Am/Be neutron source with a recent activity of 37.5 mCi.

To investigate the efficiency of the "created instrument", ten hydrogenous material samples (ordinary p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Stability Study of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) Complexes with Pyrazol Derivative
...Show More Authors

In this work lactone (1) was prepared from the reaction of p-nitro phenyl hydrazine with ethylacetoacetate, which upon treatment with benzoyl chloride afforded the lactame (2). The reaction of (2) with 2-amino phenol produced a new Schiff base (L) in good yield. Complexes of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) with the new Schiff base (L) have been prepared. The compounds (1, 2) were characterized by FT-IR and UV spectroscopy, as well as characterizing ligand (L) by the same techniques with elemental analysis (C.H.N) and (1H-NMR). The prepared complexes were identified and their structural geometries were suggested by using elemental analysis (C.H.N), flame atomic absorption technique, FT-IR and UV-Vis spectroscopy, in additio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Spe Asia Pacific Oil & Gas Conference And Exhibition
Effect of nanoparticles on the interfacial tension of CO2-oil system at high pressure and temperature: An experimental approach
...Show More Authors

In the recent decade, injection of nanoparticles (NPs) into underground formation as liquid nanodispersions has been suggested as a smart alternative for conventional methods in tertiary oil recovery projects from mature oil reservoirs. Such reservoirs, however, are strong candidates for carbon geo-sequestration (CGS) projects, and the presence of nanoparticles (NPs) after nanofluid-flooding can add more complexity to carbon geo-storage projects. Despite studies investigating CO2 injection and nanofluid-flooding for EOR projects, no information was reported about the potential synergistic effects of CO2 and NPs on enhanced oil recovery (EOR) and CGS concerning the interfacial tension (γ) of CO2-oil system. This study thus extensively inves

... Show More
Publication Date
Sun Feb 23 2025
Journal Name
Webology
Is the Stealth Marketing an Element of Promotion Mix? A Review of the Techniques
...Show More Authors

Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the

... Show More
View Publication