A gamma T_ pure sub-module also the intersection property for gamma T_pure sub-modules have been studied in this action. Different descriptions and discuss some ownership, as Γ-module Z owns the TΓ_pure intersection property if and only if (J2 ΓK ∩ J^2 ΓF)=J^2 Γ(K ∩ F) for each Γ-ideal J and for all TΓ_pure K, and F in Z Q/P is TΓ_pure sub-module in Z/P, if P in Q.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe global health crisis resulting from the spread of the Corona virus, which the World Health Organization described on January 30, 2020 as a public health emergency of international concern, then returned to describe it as a pandemic on March 11, 2020, and the measures and procedures taken by government authorities in different countries of the world, whether at the highest level of imposing a comprehensive curfew or what is called globally home quarantine and thus disrupting all sectors and activities in the state, whether public or private (with the exception of some sectors such as the health, media and security sectors), or at a lower level than that, such as reducing work rates in different sectors by rates that vary from one country
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThis book presents the problem of tooth decay due to bacteria Streptococcus mutans one of methods of treatment using 3 extracts of S. persica (miswak) (aqueous, acetone and methanol) and prove its effectiveness and its impact on the gtf (B, C, and D) genes that code the glucosyltransferase (Gtf) enzymes that cause decay membrane compared to the usual means used for the prevention of tooth decay
Conducted two trials separate plants Defla first two seasons, 1998 and 1999 to test the susceptibility Altgveria three varieties including Azharha colored white and pink Qati and pink Qtmr and second seasons 1999 and 2000, two types color Azhaarhama white and pink Qati treated mind half-timbered two types of Alaoxinat IBA and NAA and three concentrations as well as repeatersAdhrt results low Almaah rooting
Porous silicon (P-Si) has been produced in this work by photoelectrochemical (PEC) etching process. The irradiation has been achieved using diode laser of (2 W) power and 810 nm wavelength. The influence of various irradiation times on the properties of P-Si material such as P-Si layer thickness, surface aspect, pore diameter and the thickness of walls between pores as well as porosity and etching rate was investigated by depending on the scanning electron micrograph (SEM) technique and gravimetric measurements.
The study includs,effect of concentration of Lead 0.2 ,0.3 , 0.5, 5 , 10 mg/L and Zinc 0.1,0.5 , 2 , 4 , 8 mg/L lonely or to gether on growth green algae( Scenedesmus quadricauda var . longispina) according to the total qauntity for the cells and the adsorption of the algae to the zn,pb concentration .growth curve and dubbling time growth were calculated with or without there heavy metals . Results shows that there are significant differences (P<0.01) for growth curve and the control. (7.5201 cell /h)and with dubbling times (9.87 cell/h). The heavy metals(Pb, Zn). shows antagonistic effect when both used in media.