Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
This study deals with the topic time of transmission of loose international sales، which is defined by the Vienna Convention on the International Sale of Goods as "passing of risk"
As a basis for "the transfer of liability from the seller's custody to the buyer's guarantee. This expression was adopted by the legislator from the Islamic jurisprudence, which is in an acceptance interview in the real estate legislation. The arrest does not require that the actual possession of the goods has actually been done by the buyer. On the face of the buyer can be caught without a hail, and the Iraqi Trade Law No. 30 Of 1984, the provisions of the Transfer of Liability in International Sale were codified، and its provisions were quoted from
... Show MoreWe propose a system to detect human faces in color images type BMP by using two methods RGB and YCbCr to determine which is the best one to be used, also determine the effect of applying Low pass filter, Contrast and Brightness on the image. In face detection we try to find the forehead from the binary image by scanning of the image that starts in the middle of the image then precedes by finding the continuous white pixel after continuous black pixel and the maximum width of the white pixel by scanning left and right vertically(sampled w) if the new width is half the previous one the scanning stops.
The aim of the current research is to identify the personal distance between members of society, as well as, to identify the feelings of satisfaction and positivity from respecting the permissible personal distance. The study also aims to identify the feelings of annoyance and comfort from approaching and going beyond personal distance and not respecting it. To achieve these goals, the researchers reviewed previous literature, theories, and studies that dealt with personal distance. The researchers reached a number of results; first, personal distance is not a law but rather a cultural guiding principle for social and professional morals. Second, there are four distances (intimate distance, the distance between friends, social distance,
... Show MoreLying is considered a dangerous tendency among children if it has become a habit. It results in many social problems, such as child’s loss of confidence, lack of others’ respect to him, and his lack of respect to the desired values of the society, such as honesty and trust. Consequently, he will be led to a deviation when he becomes old; especially if the child’s socially unaccepted behavior has not been directed. The research, thus, aims to examine the causes of lying in the most important stage of children’s life; that is, between (4-6) years. Such an aim helps to know about the individual reasons of lying among males and females from teachers’ perspectives. To meet the objective of the study, a number of (128) children
... Show MoreResearch Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this rese
The research dealt with the design of the cost accounting system for the transport service and its Role in improving the efficiency of pricing decisions through the application of the cost system based on ABC activities. The main activities were defined and cost guides were to measure the cost of each service and to determine the cost of each service for the purpose of providing management with appropriate information and pricing decisions The problem of research in the lack of adoption by some public companies in the service sector on the cost accounting system to calculate the cost of service as well as the lack of identification of productive activities and service activities and therefore cannot make the appropriate decision t
... Show MoreThe research aims to achieve proof of convergence between optimal costs and standard costs in calculating costs for the economic unit, support efforts aimed at adopting optimal costs in cost accounts and accounting thought in general, and achieve benefit from the theory of convergence between optimal costs and standard costs in the field of achieving actual costs in The economic unit in order to reduce and converge, and this came to address the possibility of adopting the concept of optimal costs in the production costs calculations for the purposes of rationalizing administrative decisions, and rationalizing the preparation of financial statements within management accounting.
The research concluded that
... Show MoreZM Al-Bahrani, Medico Legal Update, 2021
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show More