Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Field and laboratory experiments were performed to evaluate the allelopathic
potential of sorghum residues alone or in combination with reduced rate of trifluralin
herbicide on weeds in mung bean field. The field experiment was conducted during
2014 season at the Research Farm of Biology Department, College of Science,
Baghdad University by using randomized complete Block design (RCBD) to test the
effect of sorghum residues at rates of 5 and 10 t ha-1 alone or in combination with
reduced doses of trifluralin (30 and 60% of recommended dose) on weeds and mung
bean crop. Weedy check and label rate of trifluralin (2.4 Lha-1) were also included
for comparison. Each treatment was replicated four times. Total phenolics
The aim of this study was to measure the effectiveness of a proposed program to develop the creative abilities of the students of Tabuk University and its impact on the creative output of the NEOM project. The sample of the study consisted of (50) university students divided into two groups: an experimental group of 25 students who receive the proposed training program, and control group of (25) students.
To achieve these objectives, the researcher designed and developed tools to collect the required data, which were verified their validity and reliability.
The descriptive statistics of mean, standard deviations, correlation coefficient, T test for the associated sample were used in the analysis of the results of th
... Show MoreObjectives: To assess general social factors for elderly in geriatric homes in Jordan.
Methodology: The study was conducted for clients residing in elderly homes. A purposive sample of (155)
residents were selected. Social resource scale by (Duck University Center) called (OARA) older adult resources
and services was used as tool for data collection. The questions extract data about family structure, patterns of
friends and visiting, availability of a confident, satisfaction with the degree of social interaction and availability
of a helper in the event of illness or disability and the program of trips in the houses.
Results: The findings revealed that the life expectancy for women is greater than for men. In respect to
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: Bell's palsy was defined as facial weakness of lower motor neuron type caused by idiopathic facial nerve involvement outside the central nervous system without evidence of aural or more widespread neurologic disease. The cause is unclear, but the disorder occurs more commonly in diabetics.Objectives: to differentiate cases of idiopathic Bell's palsy from diabetic mononeuropathy presented with Facial nerve palsy by assessing the taste, because they differ in etiology, management & prognosis.Patients &Methods: One hundred and fifteen consecutive patients were referred for the treatment of facial palsy, from May the 5th 2012 to April 12th 2013 in Al-Kindy Teaching Hospital and The Neurosciences Hospital, in Baghdad / Ira
... Show MoreA geoelectrical investigation is carried out for a geological consideration in the Shewasoor dam site, which is situated 40 km northeast Kirkuk city. Symmetrical Schlumberger array were applied for fifteen electrical sounding (VES) points, with a maximum spread distance (120-200) meters. Seven vertical electric sounding (VES) points were surveyed in the main valley. Two (VES) points were taken at the area behind the dam, and two other points at the right side of the dam body. Additional four (VES) points measured at the left side within the spillway area. In order to achieve the qualitative and quantitative interpretations manual partial matching technique and (IPI2 WIN) (ID) software are used. The results show that the surface is compri
... Show MoreAlzheimer’s disease (AD) is a progressive disorder that affects cognitive brain functions and starts many years before its clinical manifestations. A biomarker that provides a quantitative measure of changes in the brain due to AD in the early stages would be useful for early diagnosis of AD, but this would involve dealing with large numbers of people because up to 50% of dementia sufferers do not receive formal diagnosis. Thus, there is a need for accurate, low-cost, and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, electroencephalogram (EEG) based biomarkers can play a vital role in early diagnosis of AD as they can fulfill these needs. This is a cross-sectional study that aims to demon
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreThis study was conducted on the workers of the brick kilns at Al- Nahrawan area south-east of Baghdad city to investigate the effect of the pollutant emissions (fumes and gases) released from the burned fuel in this kiln. Blood samples were taken from group individuals of workers at this brick kilns and non-working individuals as a control. The influence of these emissions on the workers' health was measured by examining certain chromosomal aberrations among the workers. These aberrations were a formation of: chromosomal rings, dicentric chromosomes, breaks arm and acentric fragments. It has been observed that most of these aberrations were found within workers of age 40 years and above, represented by formations of averages 1.50 and 1.0
... Show More