Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Objective: The incidence of infectious diseases among hospitalized children remains high. This study describes the environmental health indicator diseases and differences between gender and age of the affected children. Patients & Methods: A review of hospitalization and death causes among children admitted to the Child Teaching Hospital for Pediatrics in Baghdad, Iraq was performed. Medical records of children admitted throughout three years period were collected for demographics data and statistical analysis using Chi-square test. Results: A total of 4,272 admissions and 309 deaths were recorded. Infectious diseases remain the primary cause of hospitalization among children and frequently lead to death; which recorded (56%) followed by ac
... Show MoreInfrastructure projects take a long time, are complex, multidisciplinary, use different materials and products, and have high risk. These characteristics affect the process of supplying materials. The current paper studies the ability to improve the supply chain process and decrease its cost by identifying the factors that affect it. These factors are used as variables in the mathematical model, which is working under uncertain conditions when the consumption rate of materials is not constant. The information used in this model is obtained from Building Information Modeling (BIM) and Geographical Information System (GIS) techniques and the genetic algorithm is utilized to determine the optimal supplier and the quantities of supplies
... Show MoreFlooding hazard is an important and dangerous natural phenomenon that leads to significant material losses. It should be studied and scenario to prevent significant losses. The studies should consider the impact of many factors such as human, infrastructure, economic,..etc. The main objective of the research is the risk management procedure. The study was conducted in Baghdad, Iraq. The materials for completing this research were prepared by gathering a satellite image and Digital Elevation Model (DEM) via the USGS website, then processed, analyzed, and converted into a different flood region concerning the probability of rising water levels where the normal height of Baghdad city is 28m over sea level. This scenario defines 3m,
... Show MoreFracture pressure gradient prediction is complementary in well design and it is must be considered in selecting the safe mud weight, cement design, and determine the optimal casing seat to minimize the common drilling problems. The exact fracture pressure gradient value obtained from tests on the well while drilling such as leak-off test, formation integrity test, cement squeeze ... etc.; however, to minimize the total cost of drilling, there are several methods could be used to calculate fracture pressure gradient classified into two groups: the first one depend on Poisson’s ratio of the rocks and the second is fully empirical methods. In this research, the methods selected are Huubert and willis, Cesaroni I, Cesaroni II,
... Show MoreInternational law has proven that it is an evolving and flexible law over the years, and despite that, this development takes a very long time, as the concept of peremptory norms took 83 years to crystallize and have concrete and impactful applications, and within this development another modern concept emerged, which is the obligations Erga Omnes in the Barcelona Traction case 1970. We have concluded that these two concepts fall under a broader concept, which is peremptory norms, and this concept represents the common supreme interests of the international community, and consists of rules that transcend all other rules in international law, and it is not permissible to derogate or deviate from them. On the other hand, it bears the oblig
... Show MoreComputers have been used for numerous applications involving the automatic or semiautomatic recognition of patterns in image. Advanced manufacturing system requires automated inspection and test method to increase production and yield best quality of product. Methods are available today is machine vision. Machine vision systems are widely used today in the manufacturing industry for inspection and sorting application. The objective of this paper is to apply machine vision technology for measuring geometric dimension of an automotive part. Vision system usually requires reprogramming or parameterization of software when it has to be configured for a part or product. A web camera used to capture an image of an automotive part that has been ch
... Show More