Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreThe aim of this scientific study is to diagnose the nature of the relationship between academic education in the field of media, communication and media practice. The university offers theoretical and practical lessons to students on the concepts of communication sciences, theories, models, legislations, ethics, and techniques over three years or more. And the diploma in the field of communication and Media Sciences gives students the opportunity to work in the field of journalism and media in the future, this is what many academics and media thinkers in Algeria believe, while another trend sees the exact opposite: The study of information and communication sciences within the university in the form of theoretical lessons cannot contribu
... Show MoreThe Shiite religious authority in Iraq has played an active and vital role over its long history in promoting values of tolerance, rejecting extremism, advocating unity and confronting external challenges. This role has increased significantly after 2003 as a result of the great challenges that have passed in Iraq. Despite its clear policy of non-interference in political matters, except in cases of necessity, but the great role it played in maintaining national unity and advocating the rejection of extremism and sectarianism has made it a necessary need in Iraq to confront any deviations, dispersions or threats that affect society and the state. Therefore, its role in the process of reform was prominent on the political level by calling
... Show MoreA ventricular septal defect (VSD) is defined as a communication between the left and right ventricles or between the left ventricle and the right atrium. VSDs are amongst the most common abnormalities of the heart. They can be present in isolation or in association with other congenital cardiac abnormalities. This is study done with the aim to evaluate the types, size, associated CHD with ventricular septal defect in children and adolescent in two cardiac centers (Medical City Complex cardiac clinics, Ibn Al Nafaes teaching hospital) in Baghdad - Iraq
To assess the effect of Nigella sativa oil as a topical preparation for treatment of oro- genital ulceration of Behcet's disease. This is a double blinded therapeutic trial in which 40 patients with Behcet's disease manifested as recurrent episodes of oral and genital ulceration were enrolled into 2 groups; Nigella sativa oil was applied as 10% in glycerin topically 3 times / daily to the first 20 patients. The other 20 were given glycerin only. Assessment was done 4 days then 8 days after treatment.Results were recorded as they appeared in clinical examination and those records were arranged in tables for both groups concerning oral and genital ulceration cases.Nigella sativa oil is a new topical agent for promotion of healing of o
... Show MoreBackground: Bowel cancer is the most prevalent digestive system cancer and is the 4th largest cause of cancer-related death worldwide. In Iraq, colon and rectal cancer (CRC) is the 6th most common malignancy in males and the 5th in females. This cancer is sluggish in growth, which gives a window of opportunity to screen for both precursor lesions and early cancer. The Cluster of Differentiation 47 (CD47) protein is a type of transmembrane glycoproteins found on nearly all human cells, including non-hematopoietic and hematopoietic cells. CD47 promotes CRC growth by triggering angiogenesis and apoptosis of tumor cell. Objectives: To evaluate the immunohistochemical expression of (CD47) in various colorectal samples from Iraqi patients
... Show MoreIH Abdul-Abbas, QJ Rashid, M RasimYounus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 9
Background: Diabetes mellitus is a common health problem of the world. Iron may be a part of the cause of the disease and its Complications
Objectives: This study was designed to determine the relationship between the levels of iron indices and diabetes mellitus type 2. Type 2
Type of the study: Cross –sectional study.
Methods: diabetes mellitus is clinical condition characterized by hyperglycemia due to the absolute or relative deficiency of insulin. It is also followed by pathological abnormalities like impaired insulin secretion, peripheral insulin resistance, and excessive hepatic glucose production. Although type 2 diabetes mellitus i
... Show More