Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storage has grown in popularity, and the problem of ensured deletion has been solved. Several schemes to overcome the assured deletion problem have been proposed over the last few years. The proposed solutions have addressed the scaling overhead, trusted third parties, delays, single points of failure, and other inefficiencies. Customers had the option of receiving verifiable proof of deletion from cloud service providers. This article focuses on the issue of how cloud data storage clients may be confident that the deleted data from the cloud cannot be recovered. Furthermore, it discusses the practice of secure deletion. Moreover, the paper explores currently used methods to achieve the security of assuring the deletion of data faced by cloud entities such as cloud service providers, data owners, and cloud users. After that, the paper analyzes techniques to find the pros and cons of assured deletion and the problems that were solved by these techniques. Finally, the paper identifies some future directions for the development of assured deletion of cloud storage.
The study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli
... Show MoreThis research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect and Revelation and the nature of their relationship, in two core points:
The first point: Could there be a real conflict between Intellect and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.
The second point: For whom is the priority, for the Intellect or th
... Show MoreThe rate of births delivered by cesarean section (CS) has gone up substantially all over the world. Post-cesarean surgical site infection (SSI) is a common cause of maternal morbidity and mortality that results in prolonged period of hospitalization with increased cost and direct health implications, especially in low socioeconomic population, resource- restricted settings, and war- related conditions with internal forced movement. This study was aimed to find incidence of post cesarean section surgical site infection withthe accompanying risk factors.Pregnant ladies admitted to department of obstetrics and gynecology at Medical City Hospital in Baghdad who had undergone CSs were followed up prospectively from first of January 2017 till end
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThe aim of this research was to indicate the opinion of the Iraqi consumer awareness of the risks associated with consuming canned food, the questionnaire was included 20 questions for label information, consumer culture, shopping, marketing, awareness and knowledge as a tool to survey the opinions of 300 consumers in Baghdad, the data was analyzed by using percentage, weighted mean, and weight percent, the results obtained showed that the Iraqi consumer need more information, training and guidance programs in food safety handling issue for canned food, especially in analysis of label information and growing of consumer culture for shopping, right marketing, awareness and knowledge.
Investigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data
Background:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients
Background: Bowel preparation prior to
colonic surgery usually includes antibiotic
therapy together with mechanical bowel
preparation which may cause discomfort to the
patients, prolonged hospitalization and water
& electrolyte imbalance.
Objective: to assess whether elective colon
and rectal surgery may be safely performed
without preoperative mechanical bowel
preparation.
Method: the study includes all patients who
had elective large bowel resection at Medical
City – Baghdad Teaching Hospital between
Feb, 2007 to Jan, 2010. Emergency operations
were not included. The patients were randomly
assigned to the 2 study groups (with or without
mechanical bowel preparation.
Results: A to
In this paper we introduced a new class of - called - and study their basic properties in nano topological spaces. We also introduce -closure and -interior and study some of their fundamental properties.
RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2