The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.
Sufficient high-quality data are unavailable to describe the management approach and guideline of COVID-19 disease in pediatric and adolescent population which may be due to mild presentation in most of cases and less severe complications than older ages.
World Health Organization was concerned with the establishment of an approved guideline to manage the increasing number of COVID-19 patients worldwide aiming to prevent or lessen COVID-19 global burden.
The clinical features have a wide spectrum starting from uncomplicated mild illness, mild-moderate pneumonia, severe pneumonia, acute respiratory distress syndrome, sepsis, septic shock, and multisystem inflammatory syndrome in children.
Many important definitions
... Show MoreGas and Downhole Water Sink, Gravity Drainage, GDWS-AGD, Enhance the Recovery of Oil
Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreThe present research deals with the influencing factors which depends on the way perceptual of the graphic designer which enters in the design logos of the loco European health, where the search include four chapters, the researcher reviewed in the chapter 0ne the methodical frame of the research ,as reviewed in the second chapter the theoretical frame, and the previous studies which included three sections, the first section included the perceptual understandable and types of it, and the second section included the influencing factors in the designer perceptual ways and its division . While the third section included the perceptual in graphic designer through the percepted shapes and the relation with ground and colors for express the i
... Show MoreCloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreThe data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
The construction sector consumes large amounts of energy during the lifetime of a building. This consumption starts with manufacturing and transferring building materials to the sites and demolishing this building after a long time of occupying it. The topic of energy conservation and finding the solution inside the building spaces become an important and urgent necessity. It is known that the roof is exposed to a high amount of thermal loads compared to other elements in a building envelope, so this needs some solutions and treatments to control the flow of the heat through them. These solutions and treatments may be achieved by using nanomaterials. Recently, nanomaterials have high properties, so that this made them go
... Show MoreThis study tackles the contribution of the environmental audit in achieving the sustainability of the environmental balance in the Sudanese business environment. The study aimed at clarifying the role of environmental auditing in supporting sustainable development, and to recognize the role of environmental audit in urging businesses to abide by environmental protection. It also shows how effective the environmental audit reports are, in providing the reliable data for the concerned authorities, in order to use it in making the decisions that would help in the sustainability of the environmental balance. To achieve the goals of the study, a questionnaire was developed and distributed to the registered chartered accountants in Sud
... Show More