Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Background: The SARS-CoV-2 virus causes COVID-19, a respiratory syndrome. It causes inflammation and damages several organs in the body. miRNAs play a role in regulating the infection resulting from SARS-CoV-2. MicroRNA-155, a kind of microRNA linked to viral defences, can affect the immune responses during COVID-19. Objectives: Examination of the involvement of microRNA-155 in the development and severity of COVID-19, as well as finding the correlation between microRNA-155 and viral load (copies/mL) in severe cases of the disease. Materials and Method: A case-control research study was performed between October 2022 and June 2023. It included a cohort of 120 hospitalised individuals with severe cases of COVID-19, together with 115 individu
... Show MoreSongs are considered as an educational and a substantial dependable references used in teaching and learning, particularly the so - called foreign language learning that allows learners to adapt to the target language culture and to develop their language learning skills including: listening comprehension, reading comprehension, speaking and writing. Consequently, it can be said that the Francophone songs with the musical richness and resonance specifically facilities French language learning skills for all levels of education and achieve short and long terms predetermined educational language learning goals.
In fact, language learning through songs method does not only include the
... Show MorePlasma alkaline phosphatase isozyme in Iraqi fowl was studied by acrylamide gel electrophoresis. Two phenotypes fast and slow, were observed. These two phenotypes have been shown to be controlled by one single autosomal locus with two allel AKPF and AKPS. The gene frequency of AKPS is dominant over the AKPF. The result indicated that gene frequency of AKPF in leghorn and new hamshire was more frequent than in local Iraqi birds. Birds of fast isozyme type had higher 90 – day's egg production and egg weights as compared to those with slow isozyme. It is concluded that the fast isozyme can be used as gene marker for spotting out pullets with high body weight sexual maturity, high egg production and high egg weight.
the financial resources represent a basic factor of production ;It is obvious that the housing sector needs the resources to finance the building operation to produce all the housing units. Finance is the cornerstone of any housing strategy , as its successes dependent on the success of the financing methods and the creation of charnels and effective methods for the provision of the required finances for both individuals and instantly concerned with the production of housing units. The kinds of financial institutions vary from one country to another according to the nature of the economic and financial system. The lending conditions also vary as well as the capital cost of the housing units needed The housing operations is concer
... Show MoreThe research deals with Iraq's position of the Lebanese civil war and the Efforts made by Iraq in order to stop the bleeding of this war, the research also deals with the nature of regime in Lebanon and the developments that preceded the war and the positions of the internal and external competing forces, as weu as handling the Iraqi Syrian disagreement and it's impaet on the situation of Lebanon and the war developments.
The research focused on the Iraq's position towards the externd proposed solutions to solve the Lebanese civil war.
The following study was conducted to investigate the correlation between the expression of three different genes (NOB1, DDX47, CD101( with the occurrence and development of chronic myeloid leukemia (CML) in Iraq. The difference in the expression of these genes between patients and healthy controls was studied. Moreover the correlation of age and gender with CML occurrence and comparing with control was also examined. Results showed significant increases in mean of gene expression level (ΔCt) of patient groups for all genes compared to the corresponding ΔCt means in control group, also the gene expression folding (2-ΔΔCt) reflect significant differences in the expression of these genes and CD101, mRNA showed the highest level in CML pati
... Show MoreThe current research aims to identify the stressful life events among middle school students in terms of gender (male-female), academic branch (scientific-literary), and the Life Skills of the students of the preparatory stage in terms of gender (male-female), and academic branch (scientific-literary). Additionally, the study aims to identify the relationship between stressful life events and life skills in middle school students. A sample of (200) students who were selected randomly from the Directorate of education of Baghdad Karkh/ III was used in this study. To achieve the objectives of the current research, the researcher has adopted two scales, the stressful life events scale for the researcher Al-Sultan (2008), and the life skills
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show More