Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show MoreThe basis of legal clarity is contrary to the idea of natural justice, it is fair and fair that the law is clear and easy to understand, and this principle is today one of the most important elements of legal certainty through which the legislation is sought and the individuals are assured of their rights and subject to the obligations incumbent upon them , Clarity is achieved by paying attention to the issue of legal drafting and assigning it to specialists, with the aim of achieving the application of the rule of law and good governance and enacting well-developed and sophisticated legislation, in harmony with the Constitution and not in contradiction with other laws , and a concept in the general public a
... Show MoreBecloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay
... Show MoreThe goods sold during the transport phase may be exposed to the risk of the buyer's state, whether those risks are land, sea or air, resulting in the loss of the goods in whole or in part, or damage, as if they were destroyed by the ship sinking or colliding with another or the cause of the loss or damage is due to a fire, as in the case of a spark on the goods, and the goods is a combustible material. The risk should be borne by one of the parties. To identify the responsible party for the risks, it should determine a particular moment for transferring risks. There has been a difference in legislation, whether at the national or international level, on determining the basis for risk
... Show MoreVirtual reality technology is the science of the embodiment of things and move spontaneously among non-real from one place to another with the full sense of the form, touch, sound, enables the user tried out and deal with it, like a real natural world and open up new worlds for human ambitious to let him overlooks the supposed world. Internet has become part of our daily lives, especially with the presence of mobile devices; that revolutionized the world of social networking. Access to information and build relationships change in the era of digital technology. The woman is not in isolation from this era; she found to herself a wide area for the production of ideas.
When we talk about woman in the modern means of communication, this a
: In this study, a linear synchronous machine is compared with a linear transverse flux machine. Both machines have been designed and built with the intention of being used as the power take off in a free piston engine. As both topologies are cylindrical, it is not possible to construct either using just flat laminations and so alternative methods are described and demonstrated. Despite the difference in topology and specification, the machines are compared on a common base in terms of rated force and suitability for use as a generator. Experience gained during the manufacture of two prototypes is described.