Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Breast cancer is a disease in which cells in the breast grow out of control. CD200 is a cell surface glycoprotein expressed on many cells, it belongs to the immunoglobulin family (Ig) and have a great role in the regulation of inflammation in autoimmunity. CD200 is the ligand for CD200R1 receptor. To determine if serum level of CD200 and its receptor CD200R1 can be used as a diagnostic and prognostic marker in patients with breast cancer.This case control study was carried out at Oncology Teaching Hospital – Medical city in Baghdad. Six groups were enrolled, four groups were confirmed with breast cancer stage (I, II, III and IV), fifth group (benign) and sixth group was control (healthy individual). Serum is divided to me
... Show MoreThe aim of this work was to develop and validate a rapid and low cost method for estimation of ibuprofen in pharmaceutical suspensions using Reverse-Phase High Performance Liquid Chromatography. The proposed method was conducted and validated according to International Conference on Harmonization (ICH) requirements. The chromatographic parameters were as follows: column of octyldecylsilyl C18 with dimensions (150 × 4.6) mm, mobile phase composed of acetonitrile with phosphoric acid with a ratio of 50 to 50 each using isocratic mode, flow rate of 1.5 mL/min and injection volume of 5 μL. The detection was carried out using UV detector at 220 nm. The method was validated and showed short retention time for ibuprofen peak at 7.651 min, wit
... Show MoreBackground: Tooth wear is one of the most common problems in the older dentate population which results from the interaction of three processes (attrition, abrasion and erosion) and it affects all societies, different age groups, and all cultures. This study was achieved to evaluate the prevalence and distribution of tooth wear among institutionalized residents in Baghdad city\ Iraq. Subjects and Methods: This survey was accomplished on four private and one governmental institution in Baghdad city. One-hundred twenty three (61 males, 62 females) aged 50-89 years were participated in this study. The diagnosis and recording of tooth wear were according to criteria of Smith and Knight. Results: The prevalence of tooth wear was 100% with a mean
... Show MoreMolecular dynamics (MD) simulations were carried out in order to investigate the binding mode of axillaridine-A at the active site of human acetylcholinesterase (AChE) enzyme. 2.0 nanosecond of MD simulations was made for the protein and the complex to dynamically explore the active site and the behavior of the ligand at the peripheral AChE binding site. These calculations for the enzyme alone showed that the active site of AChE is located at the bottom of a deep and narrow cavity whose surface is lined with rings of aromatic residues and Tyr72 is almost perpendicular to the Trp286 ring and forms a stable - interaction. The size of the active site of the complex decreases with time due to increase the interaction. Axillaridine-A forms
... Show MoreThe field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show More