Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved. In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)
... Show MoreThis study tackles the contribution of the environmental audit in achieving the sustainability of the environmental balance in the Sudanese business environment. The study aimed at clarifying the role of environmental auditing in supporting sustainable development, and to recognize the role of environmental audit in urging businesses to abide by environmental protection. It also shows how effective the environmental audit reports are, in providing the reliable data for the concerned authorities, in order to use it in making the decisions that would help in the sustainability of the environmental balance. To achieve the goals of the study, a questionnaire was developed and distributed to the registered chartered accountants in Sud
... Show MoreThe transfer of training process occupies a great importance in achieving the ultimate goal of participating in the training programs , it is sure that this does not take place without the support of the working environment for trainees, and The research aims to personification role the work environment characteristics of supporting the transfer of training.
The research problem is the weakness transfer of training to the work en
... Show MoreDuring the study the current selection seven stations in the Zab River bottom and the Tigris River took samples a month to study the signs of bacterial contamination study coliform and colon fecal Almsobhaat and Almsobhaat Bazah and the total number of bacteria and bacterial gangrene gas causing Knkeran as well as a study to isolate and diagnose some races and types of bacterial pathogens in water or intensityusing the traditional system and the system of intestinal bacteria
Pseudomonas aeruginosa is a common and major opportunistic human pathogen, its causes many and dangersinfectious diseases due to death in some timesex: cystic fibrosis , wounds inflammation , burns inflammation , urinary tract infection , other many infections otitis external , Endocarditis , nosocomial infection and also causes other blood infections (Bacteremia). thereforebecomes founding fast and exact identification of P. aeruginosafrom samples culture very important.However, identification of this species may be problematic due to the marked phenotypic variabilitydemonstrated by samples isolates and the presence of other closely related species. To facilitate species identification, we used 16S ribosomal DNA(rRNA) sequence data
... Show MoreThe literature shows conflicting outcomes, making it difficult to determine how e-learning affects the performance of students in higher education. The effect of e-learning was studied and data has been gathered with the utilization of a variety of qualitative and quantitative methods, especially in relation to students' academic achievements and perceptions in higher education, according to literature review that has been drawn from articles published in the past two decades (2000-2020). The development of a sense of community in the on-line environment has been identified to be one of the main difficulties in e-learning education across this whole review. In order to create an efficient online learning community, it could be claim
... Show MoreMulti-belled piles are piles with enlarged ends; these piles have one or further bells at the lower third part of the pile. These piles are suitable for many soils with problems such as softening clay, the variation of groundwater table, expansive soils, black cotton soil, and loose sand. The current study reviewed the behavior of belled piles in multi-layer soils subjected to axial compression and pullout loading. The review covered the experimental and theoretical works on belled piles in multi-layered soils. These piles were subjected to static and dynamic loadings in compression and pullout cases. Most theoretical results focused on software such as PLAXIS 3D. The axial load applied on the piles comes from the upper
... Show MoreThe introduction of the research on the science of training and the physiology of sports was addressed from important sciences, where the physical effort drew the attention of scientists since the past centuries when they studied how the body performs its functions when performing physical exertion and observe the changes that occur in it and write down and study especially the positive effects of the practice of daily sports The aim of the study was to investigate the effect of plank exercises on the lipid component and the metabolic rate (bmr) of the female students of the Higher Institute for Security and Management Development. As for the third chapter, the two researchers used the experimental method on a sample of the female s
... Show More