Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreCrime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreDifferent cooking conditions were examined for aluminum content in food cooked while wrapped with aluminum foil. The influence of each anticipated factor (the acidity of the cooking medium, type of acids normally used in cuisines namely acetic and tartaric acids, various cooking temperatures, influence of the presence of sodium chloride salt, the effect of cooking oil, and the length of time of cooking) was studied thoroughly as a function of aluminum degraded out of the aluminum foils to the medium. The experimental samples were digested with nitric acid upon fulfillment of examining each factor separately before quantifying aluminum with the sensitive technique of atomic absorption spectroscopy. The outcomes of the study have shown that t
... Show MoreSolid dispersion (SD) formulation has attracted much attention due to its potential in enhancing dissolution performances of poorly soluble active pharmaceutical ingredients (API). Recently, a review on dissolution performances of SDs classifies the improvement into 3 categories, where 82 % of the studies showed improved bioavailability, 8 % showed reduced bioavailability and 10 % revealed similar bioavailability as compared to pure APIs. This indicates the inconsistent degrees of dissolution improvement of poorly soluble APIs in SD. Although a few factors related to the choice of carriers have been suggested to contribute to the dissolution improvement, however, the underlying factor determining the discrepancy in the degree of dissolution
... Show MoreBackground: The longevity of any prosthesis depends on the materials from which it was fabricated, that is why, defects in the material properties may reduce the service life of prosthesis and necessitate its replacement. The aim of this study was to evaluate the effect of adding different concentrations of Polyamide-6 (Nylon-6) on the tear and tensile strength of A-2186 RTV silicone elastomer. Materials and Methods: 80 samples were fabricated by the addition of 0%, 1%, 3% and 5% by weight PA-6 micro-particles powder to A-2186 platinum RTV silicone elastomer. The study samples were divided into four (4) groups, each group containing 20 samples. One control group was prepared without PA-6 micro particles and three experimental groups were pr
... Show MoreBN Rashid, AJES, 2014