Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
This present study demonstrated that liver was involved in 14 %of typhoid patients manifesting with hepatomegaly. Elevation of serum enzymes in typhoid fever was presumably of a muscular origin, while elevation of liver enzyme was relatively less common. This study was performed on 30 female patients diagnosed by ultrasound (US) of abdomen, with paratyphoid A, ranged between (20-40) years compared with 30 healthy control .Patients volunteers were treated with appropriate antibiotics for 14 days and investigations were repeated 2-3 week after completion of treatment. Patients had clinical and biochemical evidence of hepatic dysfunction. The spectrum of hepatic involvement included hepatomegaly , jaundice, derangement of various hepatic func
... Show MoreIn this study, the genus Xylocopa Latreille, 1802 (Hymenoptera: Apidae) was revised. There were 4 species registered in our investigations: X. hottentotta Smith, 1854; X. olivieri Lepeletier, 1841; X. pubescens Spinola, 1838 and X. valga Gerstäcker, 1872, the first species was described as being found for the first time for the insect fauna of Iraq, which were obtained from Solanum melogena L. flowers. Key to the species was constructed and supported by figures of the main diagnostic characters and some morphological features, illustrated and compared with other species, which are recorded in the current survey.
The present paper aims at investigating the linguistic image portrayed by UNICEF reports on the Iraqi child from a critical discourse analysis perspective during Covid19 pandemic (2020). The paper attempts to fill a gap in research literature concerning the linguistic construction of the Iraqi child by the UNICEF reports during the critical health crisis of Covid19. Van Leeuwen’s (2008) approach of social actor representation has been adopted for this purpose. From Van Leeuwen’s approach, the category of determination (single determination and overdetermination) has been selected to be the main analytical tool for its high compatibility with the set of objectives put forward to figure out how such a globally effective and
... Show Moreرافقت القسوة الانسان منذ القدم وكثيرا ما تم الخلط بينها وبين العنف لشدة التقارب بينهما , وهنا يحاول البحث ان يفصل بين كلا المفهومين ويتفرد بمفهوم القسوة, الذي سلط عليه الضوء في المسرح لأول مرة على يد الفرنسي(انطوان ارتو) في محاولة للكشف عن المعالجة الاخراجية التي قدمها المخرج العراقي(صميم حسب الله) لمفهوم القسوة في مسرحيته الموسومة (خريف) ويتضمن البحث نبذه (مفهوم القسوة في الفكر الانساني) وكذلك (الق
... Show MoreA new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show MoreExtracorporeal shock wave lithotripsy (ESWL) is considered a standard treatment for nephrolith or kidney stones measuring less than 20 mm. Anatomical, machine-related, and stone factors play pivotal roles in treatment outcomes, the latter being the leading role. This paper examined the relationship between stone density on native CT scans and ESWL treatment to remove renal stones concerning several treatments. One hundred and twenty patients (64 males and 56 females) were enrolled and completed the study from April 2019 to September 2020. Inclusion criteria were a single renal pelvis stone of 5–20 mm to be treated for the first time in adult patients with no urinary or musculoskeletal anatomical abnormalities. We assessed patients
... Show MoreAbstract- Asymptomatic or clinically silent kidney stones are possibly serious because, in their expected passage, they may cause infection, obstruction and renal impairment. The purpose of this study was to determine the prevalence of silent kidney stones in a sample of Baghdad population and consider how this value could affect the justification for a screening system. To our best knowledge, this is the first study of its kind conducted in Iraq. We investigated 714 consecutive patients who sustained an abdominal ultrasound at our hospital with further kidney screening. All these patients did not have clinical signs and symptoms of nephrolithiasis. Age, sex, the indication for ultrasound, the size, side, and the number of the disco
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show More