Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreNew complexes of Cu (ll), Ni (ll), Co (ll), and Zn (ll) wi th 2-amino-5-p-Fiouro Phenyl 1, 3, 4-Thiadiazole have been synthesized. The products were isolated, studied and characterized by physical measurements, ie,(Ff-IR), UV-Vis and the melting points were determined. The new Schiff base (L) has been used to prepare some complexes. The prepared complexes were identified and their structural geometry were suggested
.
The flexible joint robot manipulators provide various benefits, but also present many control challenges such as nonlinearities, strong coupling, vibration, etc. This paper proposes optimal second order integral sliding mode control (OSOISMC) for a single link flexible joint manipulator to achieve robust and smooth performance. Firstly, the integral sliding mode control is designed, which consists of a linear quadratic regulator (LQR) as a nominal control, and switching control. This control guarantees the system robustness for the entire process. Then, a nonsingularterminal sliding surface is added to give a second order integral sliding mode control (SOISMC), which reduces chartering effect and gives the finite time convergence as well. S
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreThe aim of this research is to show the level of banking leadership trends in the importance of organizational confidence and its reflection in the dimensions of the strategic position the research was applied in a bank (Al- Mansour Investment, Business Bay), and the Questionnaire Was adopted as a tool to collect data and information from the number of the sample (15) who are in allocation (Department Manager, Department Manager Department Manager, Division Officer, Unit Officer) and he used the statistical program (spss) to calculate (standard deviation, arithmetic mean, percentages, regression, analysis,F-test coefficient of determination R2, Coefficieent, square Kay and the research reached a number of conclusions, the mos
... Show Moreم.د. فاطمة حميد ،أ.م.د وفاء صباح محمد الخفاجي, International Journal of Psychosocial Rehabilitation,, 2020 - Cited by 1
The phenomenon of celebration of army leaders in the Abbasid era formed a distinct phenomenon at which the poets stood, and among those leaders was the Arab leader Hamid al-Taie, and the poets who stood on him and his sons Abu Tammam and al-Bohtari recorded in their poems the exploits of that leader, and the exploits of his sons through images that represented sadness, courage In this research, the generosity, and the rhetorical and artistic aspects of those images, have been spotted, balancing the poets.
Abstract
Theoretical and experimental methodologies were assessed to test curved beam made of layered composite material. The maximum stress and maximum deflection were computed for each layer and the effect of radius of curvature and curve shape on them. Because of the increase of the use of composite materials in aircraft structures and the renewed interest in these types of problems, the presented theoretical assessment was made using three different approaches: curved beam theory and an approximate 2D strength of material equations and finite element method (FEM) analysis by ANSYS 14.5 program for twelve cases of multi-layered cylindrical shell panel differs in fibe
... Show More