Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
The current research aims to identify the stressful life events among middle school students in terms of gender (male-female), academic branch (scientific-literary), and the Life Skills of the students of the preparatory stage in terms of gender (male-female), and academic branch (scientific-literary). Additionally, the study aims to identify the relationship between stressful life events and life skills in middle school students. A sample of (200) students who were selected randomly from the Directorate of education of Baghdad Karkh/ III was used in this study. To achieve the objectives of the current research, the researcher has adopted two scales, the stressful life events scale for the researcher Al-Sultan (2008), and the life skills
... Show MoreOne of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.
Physiological status and litter size can indeed have a significant impact on ewes' hematological parameters, which are essential indicators of their health. Therefore, this study examined the hematological profiles of ewes during pregnancy with single and twins in the Awassi ewes. The present study involved 232 ewes in good health and at sexual maturity. Among them, 123 ewes had single pregnancies, while 109 ewes had twin pregnancies. The age range of the ewes included in the study was between 3.5 and 4.5 years. Hematological tests were conducted on the sheep's blood samples promptly following collection. The findings demonstrated variations in hematological parameters among pregnant
... Show MoreMercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)
... Show MoreCurrent Thesis has aimed to identify : The Psychological barriers for university students , Differences in psychological barriers depending on the variable sex (Males – Females) , Adjustment to College life for university students, Differences in Adjustment to College at university life depending on the variable sex (Males – Females), and finally, The correlation between psychological barriers and Adjustment to College life. The researcher has prepared a sample consisted of (100) male and female students who were randomly selected from university students, The researcher has adopted a measure of (2002) to measure the psychological barriers, also the researcher adjustment scale with university life.
The results showed that universi
The specimens of Camponotusxerxes Forel, 1904 were collected from different localities in Iraq; the purpose of morphological study of this species in details throughout the present study.
The description was based on major workers belonging to this species, also some notes of polymorphism in workers have been mentioned; the most important of morphological features are illustrated and figured.
The research discusses the obstacles that faced the Iraqi strategic performance in achieving sustainable development after the election of the first Iraqi government in 2005 and the most important strategies to overcome these obstacles.
The class of quasi semi -convex functions and pseudo semi -convex functions are presented in this paper by combining the class of -convex functions with the class of quasi semi -convex functions and pseudo semi -convex functions, respectively. Various non-trivial examples are introduced to illustrate the new functions and show their relationships with -convex functions recently introduced in the literature. Different general properties and characteristics of this class of functions are established. In addition, some optimality properties of generalized non-linear optimization problems are discussed. In this generalized optimization problems, we used, as the objective function, quasi semi -convex (respectively, strictly quasi semi -convex
... Show MoreLithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show More