Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
This research sheds light on the physical environment role in creating the place attachment, by discussing one of the important factors in the attachment creation, it is the concept place dependence, consisting of two important dimensions: the place quality and the place expectation; they contain a number of the supporter physical environment sub-indicators for place attachment. Eight physical indicators were reached; they were found to have a close relationship to the place attachment, including: the open and green spaces existence, land use diversity, diversity of housing types, dwelling / population density, accessibility, transport network development degree, transport multiple mo
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show Morehe research specifies important subjects which contribute in improvement of productive performance in industrial companies through study and analysis of relationships and effect between dimensions of physical work environment and industrial operations flexibility in the leathers industries company. To reach these goals the information are collected is questionnaire prepared for this purpose as a tool to analyze the practical results and are recorded for a sample of 118 persons from employees. The research uses the statistical methods and analyzes the information by using SPSS system. The research reached to many conclusions; the important one is the weakness of the company to make in to account the physical envir
... Show MoreAbstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe present research aims at the following:
- Measure Classroom environment of university Student (research sample)- Measure
Cognitive motive and Reflective Thinking of university Student (research Sample) .
- In order to Know the relationship between the Scores of Classroom environment and
Scores of cognitive motive and Scores of Reflective Thinking of university Student
(research Sample) .
Sample of research consisted of (500) Students for both genders distrivbted upon ten
colleges in Baghdad University , (5) Scientific Colleges , and (5) human Colleges , Sample
was chosen by using radom method Research instruments were three , Prepared by the researcher ,The first is to measure
classroom environme
This search concerns study the crack growth in the wall of pipes made of low carbon steel under the impact load and using the effect of moisture (rate of moisture 50%). The environmental conditions were controlled using high accuracy digital control with sensors. The pipe has a crack already. The test was performed and on two type of specimens, one has a length of 100cm and other have length 50cm. The results were, when the humidity was applied to the pipe, the crack would enhance to grow (i.e. the number of cycles needed to grow the crack will reduce). In addition, when the test performed on the specimens of length 50cm the number of cycles needed to grow the crack is increased due to the effect of bending stress on the
... Show MoreThis research concerns study the crack growth in the wall of pipes made of low carbon steel under the impact load and using the effect of hygrothermal (rate of moisture 50% and 50℃ temperature). The environmental conditions were controlled using high accuracy digital control with sensors. The pipe have a crack already. The test was performed and on two type of specimens, one have length of 100cm and other have length 50cm. The results were, when the humidity was applied to the pipe, the crack would enhance to growth (i.e. the number of cycles needed to growth the crack will reduce). In addition, when the temperature was increase the number of cycles needed to growth the crack are reduced because the effect of heat on the mechanical pro
... Show MoreThrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show More