Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Leishmania parasites reproduce wherever there are cells of the mononuclear phagocyte system, almost in macrophages. These are most copious in the liver and spleen;therefore, infection leads to an expansion of both of them. This study determined the burden of visceral leishmaniasis (VL) infection on liver and spleen. A total of 20 mice were infected peritoneally with 2x107promastigotes of Leishmania donovani / ml and other 12 mice left without infection as a healthy control. The weight of whole body, liver and spleen were measured and the histological development using hematoxylin and eosin stains were determined after 15, 30, 45-and 60-days post infection. The results represent that the mean weights of liver and spleen were increased in inf
... Show MoreAn efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i
... Show MoreThis research aims to understand the mineralogical and geochemical characteristics of the nickel laterite deposit in the East Sulawesi Ophiolite Belt in Wiwirano District, North Konawe, Southeast Sulawesi, Indonesia. The deposit is analyzed and described to determine the laterization process and supergene enrichment. The geochemical data was obtained from X-ray fluorescence analysis, and mineralogical data from petrography and X-ray diffraction analysis. The minerals in the limonite zone are dominated by goethite and hematite. Minerals found in the saprolite zone include quartz, orthopyroxene, and lizardite, whereas the bedrock is made up of olivine, orthopyroxene, serpentine, and chromite. Fe2O3, Al2O3, and Co contents are high in
... Show MoreBackground: Dental erosion is a common oral condition which results due to consumption of high caloric and low pH acidic food such as carbonated drinks and fruit juices. It is expected that these food types can cause irreversible damage to dental hard tissues and early deterioration of the dental restorations. So, this study aimed to evaluate and compare the erosive potential effects of orange fruit juice and Miranda orange drink on the microhardness of an orthodontic composite material. Materials and methods: Thirty discs with a thickness of 2 mm and a diameter of 10 mm were prepared from orthodontic bonding composite. The prepared discs were equally divided into three groups (n=10). Microhardness analysis was carried out both prior to
... Show MoreIn vitro tests have been carried out to find out the efficacy of watery extracts of garlic Allium sativum and hot pepper Capsicum spp. against the trophozoites of Entamoeba histolytica cultivated in liver infusion agar media at 37 c . The doses of ( 0.01, 0.05 ,0.1, 0.5, 1 ml )of garlic and hot pepper watery extracts were added to certain number of E. histolotica trophozoits for exposure time of 24 hrs., the mortality percentage of trophozoites treated with garlic extract were ( 14.82 %, 31.05% ,46.16% , 64.29% , 92.7%) respectively , these percentages were very close to that obtained from the treatment with the hot peper extract which were (17.86%, 32% , 44% ,66.67% ,100%) respectively . Generally these results showed that the ga
... Show MoreThe molluscum contagiosum virus (MCV) is a dermatotropic poxvirus. The causative agent of molluscum contagiosum (MC) is nonlethal, common and worldwide. Additionally, little inflammation is associated with MC papules. The present study aims to evaluate the immune status of MC patients by measuring the level of immunoglobulins IgG and IgM by using the radial immune diffusion assay (RIA) and the level of interleukin 18 receptor 1 (IL-18R1) by the Enzyme-linked immunosorbent assay (ELISA).The study is conducted during November 2013 to April, 2014 in outpatient clinic of Baquba Teaching Hospital. There are 75 patients, diagnosed with clinical lesions of MCV on different areas of the body, whose age is ranged between 2-50 years including 40(53.
... Show More