Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Portland cement concrete is the most commonly used construction material in the world for decades. However, the searches in concrete technology are remaining growing to meet particular properties related to its strength, durability, and sustainability issue. Thus, several types of concrete have been developed to enhance concrete performance. Most of the modern concrete types have to contain supplementary cementitious materials (SCMs) as a partial replacement of cement. These materials are either by-products of waste such as fly ash, slag, rice husk ash, and silica fume or from a geological resource like natural pozzolans and metakaolin (MK). Ideally, the utilization of SCMs will enhance the concrete performance, minimize
... Show MoreImproving the environment is a mission that should be conducted by three associates; public authorities, environmentalists and the community. The ignorance of environmental education in Iraq has resulted to an almost environmentally illiterate community, demanding well planned programs to raise their environmental; awareness and education. On the other hand, the decision makers should be well informed about the citizens' environmental preferences to be able to set their priorities for the civil services. Merging the Iraqi citizens in listing their environmental priorities is one of many other approaches for "Environment Education" programs. Globally, such methods have proven to be effective and resulted to widespread understandin
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreThe meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show MoreA cumulative review with a systematic approach aimed to provide a comparison of studies’ investigating the possible impact of the active form of vitamin D3, calcitriol (CTL), on the tooth movement caused by orthodontic forces (OTM) by evaluating the quality of evidence, based on collating current data from animal model studies, in vivo cell culture studies, and human clinical trials. Methods: A strict systematic review protocol was applied following the application of the International Prospective Register of Systematic Reviews (PROSPERO). A structured search strategy, including main keywords, was defined during detailed search with the application of electronic database systems: Medline/Pubmed, EMBASE, Scopus, Web of Science, and
... Show MoreThis study deals with establishing the depositional environment of the Fatha Formation through facies analysis. It also deals with dividing the formation into units based on the rhythmic nature. Data from selected shallow wells near Hit area and deep wells at East Baghdad Oil field are used. Five major lithofacies are recognized in this study, namely, greenish grey marl, limestone, gypsum (and/or anhydrite), halite and reddish brown mudstone (with occasional sandstone).The limestone lithofacies is divided into three microfacies: Gastropods bioclastic wackestone microfacies, Gastropods peloidal bioclastic packstone, and Foraminiferal packstone microfacies.The lithofacies of the Fatha are nested in a rhythmic pattern or what is known as sh
... Show MoreThe wide use of pesticides in recent years leads to rapid distribution of these pollutants in the environment (air, water and soil).They were transported by means of air or water to biological ecosystems. They become more toxic through the processes of biological magnification while some of them persist for along period.The aim of this work is to show the negative effect that chemical pesticides causes, and in the same to show their side effect on the environment and health in Iraq. We could conclude that the bad use of these chemicals could cause an urgent impact now or in the future. Governmental offices dealing with these materials should take the right measures to minimize the danger and the misuse of these chemicals by seeking alternat
... Show MoreVirtual reality technology is the science of the embodiment of things and move spontaneously among non-real from one place to another with the full sense of the form, touch, sound, enables the user tried out and deal with it, like a real natural world and open up new worlds for human ambitious to let him overlooks the supposed world. Internet has become part of our daily lives, especially with the presence of mobile devices; that revolutionized the world of social networking. Access to information and build relationships change in the era of digital technology. The woman is not in isolation from this era; she found to herself a wide area for the production of ideas.
When we talk about woman in the modern means of communication, this a
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show More