Preferred Language
Articles
/
jBcdPo4BVTCNdQwCqD4w
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.

Crossref
View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Unque Necklace ; ( Al – Iqd Al – Farid) ; A Reading in the Light of Speech Acts Theory
...Show More Authors

Summed up the idea of this research in an attempt to find the establishment of the knowledge convergence to show the features of verbal acts that occurred a prime location in the lesson deliberative theory book unique contract ( IbnAbdRabbaAndalusian ) to prove that Arabic was the old literary studies included many of the features of this theory in both theoretical and practical

View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW HOST RECORD FOR TOMATO LEAF MINER TUTA ABSOLUTA (MEYRICK, 1917) IN BAGHDAD PROVINCE, IRAQ
...Show More Authors

  In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.

View Publication Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The comparative method in Maupassant’s (A woman’s Life): Le système comparatif dans Une vie de Maupassant
...Show More Authors

The comparative method plays a major role in Maupassant’s novel (A woman’s Life).This is due to a good theme choice and smooth writing style characterized by simplicity, spontaneity and brevity.

The author uses the comparative method in the introduction of his novel where he compares the monastery’s closed world to the open world of the countryside of La Normandie, which represents the dream life of the heroine Jeanne.

The present paper is an attempt to answer the question regarding the importance of applying the comparative method in the novel (A Woman’s Life) by Maupassant. The paper stresses the fact that the novelist employs the comparative method in his book for certain features .One of these features is the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Laboratory study on the effects of nutrient enrichment on a phytoplankton population in Sawa Lake, Iraq
...Show More Authors

Nutrient enrichment of Sawa lake water was made using different nitrogen and phosphorus concentrations during autumn and spring at three stations. Different concentrations of nitrogen, phosphorus and N: P ratios were used to test variations in phytoplankton population dynamics. Nitrogen at a concentration of 25 µmole.l-1 and N: P ratio of 10:1 gave highest phytoplankton cell number at all stations and seasons. A total of 64 algal taxa dominated by Bacillariophyceae followed by Cyanophyceae and Chlorophyceae were identified. The values of Shannon index of diversity were more than one in the studied stations.

View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
A Comparative Study of Single-Constraint Routing in Wireless Mesh Networks Using Different Dynamic Programming Algorithms
...Show More Authors

Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cubic Bipolar Fuzzy Ideals with Thresholds (α, β), ( ω ,ϑ) of a Semigroup in KU-algebra
...Show More Authors

In this paper, we introduce the concept of cubic bipolar-fuzzy ideals with thresholds (α,β),(ω,ϑ) of a semigroup in KU-algebra as a generalization of sets and in short (CBF). Firstly, a (CBF) sub-KU-semigroup with a threshold (α,β),(ω,ϑ) and some results in this notion are achieved. Also, (cubic bipolar fuzzy ideals and cubic bipolar fuzzy k-ideals) with thresholds (α,β),(ω ,ϑ) are defined and some properties of these ideals are given. Relations between a (CBF).sub algebra and-a (CBF) ideal are proved. A few characterizations of a (CBF) k-ideal with threshol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
A Proposed Artificial Intelligence Algorithm for Assessing of Risk Priority for Medical Equipment in Iraqi Hospital
...Show More Authors

This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Biomathematics
A non-conventional hybrid numerical approach with multi-dimensional random sampling for cocaine abuse in Spain
...Show More Authors

This paper introduces a non-conventional approach with multi-dimensional random sampling to solve a cocaine abuse model with statistical probability. The mean Latin hypercube finite difference (MLHFD) method is proposed for the first time via hybrid integration of the classical numerical finite difference (FD) formula with Latin hypercube sampling (LHS) technique to create a random distribution for the model parameters which are dependent on time [Formula: see text]. The LHS technique gives advantage to MLHFD method to produce fast variation of the parameters’ values via number of multidimensional simulations (100, 1000 and 5000). The generated Latin hypercube sample which is random or non-deterministic in nature is further integ

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Tendencies of Scientific Research in the Specialized Journalism: the Media Researcher Magazine A sur-vey study
...Show More Authors

The study of the tendencies of scientific research in specialized journalism through the three specialized levels, specifically the third level. It is referred to be a monthly, quarterly or annual magazine that follows the publication of the researches for new studies which have come to in every specialization. it is directed to the highly educated and is almost an alternative book. Thus, the subject is specialized and the audience is specialized.

The study aims in both its survey and field section at knowing the type of researches and their classification and the form, gender and the use of foreign sources and their scientific tank and the geographical position in addition to knowing the opinions of researchers and their satisfa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (23)
Scopus Clarivate Crossref