Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: Non-traumatic Intracerebral Hemorrhage (ICH) results from rupture of blood vessels in the brain. ICH categories can also be considered as being either lobar in location or within the deep white matter. Although hypertension is a major risk factor for ICH in general[11], it is commonly considered to be associated more with patients having deep than with those having lobar haemorrhage.
Objectives: We investigate the relationship between hypertension and deep versus lobar intracerebral hemorrhage (ICH).
Methods: a retrospective review of records of 163 patients aged 18-89 years admitted to Al-Kadhimiya Teaching Hospital (January 2008 - October 2010) and diagnosed with ICH.
Results: There was no significant relationship
Blockchain technologies have grown in popularity over the last few years, with various experts touting the technology's potential applications in a range of businesses, markets, organizations, and governmental institutions. In the brief history of blockchain, an astounding number of incredible implementations have been done in terms of how it may be utilized and the potential effect it may have on a range of sectors. And, because of the great number and complexity of these characteristics, addressing the blockchain's potential and complications can be difficult, especially when seeking to address its purpose and fit for a certain activity. The blockchain's practical skills in fixing multiple challenges that are currently prevent
... Show MoreHyperbole is an obvious and intentional exaggeration in the sense that it takes things to such an extreme that the audience goes too far and then pulls itself back to a more reasonable position, i.e. it is an extravagant statement or figure of speech not intended to be taken literally. This paper focuses on the formal and functional perspectives in the analysis of hyperbole which American candidates produce in their speeches in electoral campaigns, for it is hypothesized that candidates in their electoral campaigns use hyperbolic expressions excessively to persuade voters of the objectives of their electoral campaign programs. Hence, it aims to analyze hyperbole in context to determine the range of pragmatic func
... Show MoreBackground: Adenosine mediates homodynamic
changes and resulted in the production of acute renal
failure (ARF) in female Albino-Wister rats, therefore,
adenosine level increases highly in ARF.
Objective: This experiment was designed to
investigate the effect of the adenosine antagonist
aminophylline and the adenosine agonist indomethacin on glycerol-induced ARF.
Method: Glycerol induced ARF was produced by a
single dose (10ml/kg, 50%v/v with distilled water i.m)
in rats, which were restricted to drinking water.
Aminophylline was used in our study in a dose of
25mg/kg, i.p) while the dose of indomethacin was
10mg/kg, i.p), assessment of renal function was done
by measuring blood urea
nitrogen (BUN
The present study was done to identify the karyotype of Mystus pelusius fish , which is the only representative of the family Bagridae in Iraq, they have been caught from Tigris river in AL-Kraat area of Baghdad city, the results show that the diploid chromosome number was 2n=32 and the males chromosomal types included 2n=(6m+13sm+7st+6t)and fundamental number FN=51, in females chromosomal types included 2n=(6m+12sm+8st+6t)with FN=50,also it observed that the first submetacentric pair was the largest within the biarmed chromosomes .The results revealed that the male heterogamety and the female homogamety , accordingly it follows the sex determination system (XX / XY) , as the (X) chromosome represented by medium sized submetacentr
... Show MoreThis research is seeks to state the role of Green Human Resources Management Practices and their dimensions (Green Employment and Selection, Green Performance Assessment, Green Training & Development and Green Compensation and Stimulation Systems) in strengthening the Strategic Positioning in the Nongovernmental Hospitals in Erbil city, and aims to analyze the relationship between Green Human Resources Management Practices and Strategic Positioning and to show the impact of Green Human Resources Management Practices in determining the Strategic Position.
It is depended on a questionnaire as key tools for achieving data, as designed on
... Show MoreBackground: The role of Human papillomaviruses (HPV) in the etiology of ovarian cancer remains unclear and the results are controversial. Several studies have verified the presence of HPV DNA in both malignant and benign ovarian tumors.
Objectives: Determine the percentage of detection of HPV high (16&18) and low risk types (6&11) in surface epithelial ovarian carcinoma compared to benign and control groups.
Materials And Methods: Molecular detection and genotyping of HPV DNA were performed in 76 ovarian tissue blocks by using in situ hybridization (ISH) technique for detecting and localization of high risk HPV (16 and 18) and low risk HPV (6&11) types.
Results: The presence of ISH signals fo