Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MorePolymeric hollow fiber membrane is produced by a physical process called wet or dry/wet phase inversion; a technique includes many steps and depends on different factors (starting from selecting materials, end with post-treatment of hollow fiber membrane locally manufactured). This review highlights the most significant factors that affect and control the characterization and structure of ultrafiltration hollow fiber membranes used in different applications.
Three different types of polymers (polysulfone PSF, polyethersulfone PES or polyvinyl chloride PVC) were considered to study morphology change and structure of hollow fiber membranes in this review. These hollow fiber membranes were manufactured with different pro
... Show MoreThe energy requirements of corn silage harvesters and the application of precision agricultural techniques are essential for efficient and productive agricultural practices. The article aims to review previous studies on the energy requirements needed for different corn silage harvesting machines, and on the other hand, to present methods for measuring corn silage productivity directly in the field and monitoring it based on microcontrollers and artificial intelligence techniques. The process of making corn silage is done by cutting green fodder plants into small pieces, so special harvesters are used for this, called corn silage harvesters. The purpose of harvesting corn silage is to efficiently collect and store as many digestible nutrien
... Show MoreWe present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Skin drug administration is the method used to provide drugs for local or systemic therapy, which is recognized for clinical usage. It is the third-largest method of medication delivery, after only intravenous administration and oral administration. Using a transdermal delivery method makes the administration easy, and blood concentration and adverse effects can be reduced. A microneedle is a micron-sized needle with a short height of no more than 500 micrometers and a width of no more than 50 micrometers. The needle comes into contact with the epidermal layer of the skin before it gets to the dermal layer, where there is no discomfort. Several materials, such as metals, inorganic, and polymer materials, are used to create microneed
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More