Preferred Language
Articles
/
JBfoV5MBVTCNdQwCIdFo
Security in Cloud Computing

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
EfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficient text in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Oct 02 2005
Journal Name
Journal Of The Faculty Of Medicine Baghdad
improvement in sperm motility viability and normality after treatment with prednisolone antisperm antibody separation and in invitro sperm activaition in immunologyically infertile men

Background:

Crossref
View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Prevalence of Hypertension in Deep and Lobar Intracerebral Hemorrhage in a Group of Iraqi Patients

Background: Non-traumatic Intracerebral Hemorrhage (ICH) results from rupture of blood vessels in the brain. ICH categories can also be considered as being either lobar in location or within the deep white matter. Although hypertension is a major risk factor for ICH in general[11], it is commonly considered to be associated more with patients having deep than with those having lobar haemorrhage.
Objectives: We investigate the relationship between hypertension and deep versus lobar intracerebral hemorrhage (ICH).
Methods: a retrospective review of records of 163 patients aged 18-89 years admitted to Al-Kadhimiya Teaching Hospital (January 2008 - October 2010) and diagnosed with ICH.
Results: There was no significant relationship

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Blockchain in Realistic Areas of Application and Difficulties Encountered: A Survey Study

     Blockchain technologies have grown in popularity over the last few years, with various experts touting the technology's potential applications in a range of businesses, markets, organizations, and governmental institutions. In the brief history of blockchain, an astounding number of incredible implementations have been done in terms of how it may be utilized and the potential effect it may have on a range of sectors. And, because of the great number and complexity of these characteristics, addressing the blockchain's potential and complications can be difficult, especially when seeking to address its purpose and fit for a certain activity. The blockchain's practical skills in fixing multiple challenges that are currently prevent

... Show More
Crossref
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Formal and Functional Perspectives in the Analysis of Hyperboles in Obama's Speeches

     Hyperbole is an obvious and intentional exaggeration in the sense that it takes things to such an extreme that the audience goes too far and then pulls itself back to a more reasonable position, i.e. it is an extravagant statement or figure of speech not intended to be taken literally. This paper focuses on the formal and functional perspectives in the analysis of hyperbole which American candidates produce in their speeches in electoral campaigns, for it is hypothesized that candidates in their electoral campaigns use hyperbolic expressions excessively to persuade voters of the objectives of their electoral campaign programs. Hence, it aims to analyze hyperbole in context to determine the range of pragmatic func

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
The Influences of Aminophylline and Indomethacin in Glycerol-Induced Acute Renal Failure in Rats

Background: Adenosine mediates homodynamic
changes and resulted in the production of acute renal
failure (ARF) in female Albino-Wister rats, therefore,
adenosine level increases highly in ARF.
Objective: This experiment was designed to
investigate the effect of the adenosine antagonist
aminophylline and the adenosine agonist indomethacin on glycerol-induced ARF.
Method: Glycerol induced ARF was produced by a
single dose (10ml/kg, 50%v/v with distilled water i.m)
in rats, which were restricted to drinking water.
Aminophylline was used in our study in a dose of
25mg/kg, i.p) while the dose of indomethacin was
10mg/kg, i.p), assessment of renal function was done
by measuring blood urea
nitrogen (BUN

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Study of Chromosomal Structure in Mystus pelusius (Solander in Russell,1794) Fish

  The present study was done to identify the karyotype of Mystus pelusius fish , which is the only representative of the family Bagridae in Iraq, they have been caught from Tigris river in AL-Kraat area of Baghdad city, the results show that the diploid chromosome number was 2n=32 and the males chromosomal types included 2n=(6m+13sm+7st+6t)and fundamental number FN=51, in females chromosomal types included 2n=(6m+12sm+8st+6t)with FN=50,also it observed that the first submetacentric pair was the largest within the biarmed chromosomes .The results revealed that the male heterogamety and the female homogamety , accordingly it follows the sex determination system (XX / XY) , as the (X) chromosome represented by medium sized submetacentr

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
the role of Green Human Resources Management Practices in strengthening the Strategic Positioning An Analytical Research on Leaders opinion in the Nongovernmental Hospitals in Erbil

This research is seeks to state the role of Green Human Resources Management Practices and their dimensions (Green Employment and Selection, Green Performance Assessment, Green Training & Development and Green Compensation and Stimulation Systems) in strengthening the Strategic Positioning in the Nongovernmental Hospitals in Erbil city, and aims to analyze the relationship between Green Human Resources Management Practices and Strategic Positioning and to show the impact of Green Human Resources Management Practices in determining the Strategic Position.

            It is depended on a questionnaire as key tools for achieving data, as designed on

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Detection of Human papillomavirus in surface epithelial ovarian carcinoma using in situ hybridization technique

Background: The role of Human papillomaviruses (HPV) in the etiology of ovarian cancer remains unclear and the results are controversial. Several studies have verified the presence of HPV DNA in both malignant and benign ovarian tumors.
Objectives: Determine the percentage of detection of HPV high (16&18) and low risk types (6&11) in surface epithelial ovarian carcinoma compared to benign and control groups.
Materials And Methods: Molecular detection and genotyping of HPV DNA were performed in 76 ovarian tissue blocks by using in situ hybridization (ISH) technique for detecting and localization of high risk HPV (16 and 18) and low risk HPV (6&11) types.
Results: The presence of ISH signals fo

... Show More
Crossref (1)
Crossref
View Publication Preview PDF