Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Background: Cervical lymph nodes are the most frequently enlarged and biopsied of all the peripheral lymph nodes and in most of the cases the enlargement results from benign infectious causes, however, the presence of cervical lymphadenopathy (LAP) requires accurate diagnosis to exclude more serious causes. The aim of this study was to analyze cases of Iraqi patients presenting with cervical LAP who underwent surgical lymph node biopsy to establish accurate diagnosis. Materials and Methods: This retrospective study included 25 patients who presented with cervical LAP for whom surgical biopsy was performed to establish a definitive diagnosis. The investigated data included the demographic and clinical parameters in addition to the final his
... Show MoreThe importance of this research lies in assessing the current state of media in Iraq based on international indicators and standards set by the Research and Scientific Exchange Council and UNESCO. That is to measure the strength and durability of media after 9 April 2003. These indicators are divided into five objectives that measure and describe each of the five research objectives that we seek to test through the points system.
Based on the foregoing, researchers in Iraqi media find that these conditions may lead to further decline unless measures are taken to help avoid mistakes, provide the requirements for development and progress. In addition, care from the State is needed to support this process, which would
... Show MoreTerrorism is an old phenomenon, but awareness of its seriousness talk of where to stretch the impact of the terrorist crime and the magnitude of the results as well as the community's awareness of the newly therefore appeared studies and special laws to deal with this phenomenon, especially that this phenomenon has increased the time being to enter an organization where the scientific methods and modern techniques that cause destruction and horror of mass.That the term terrorism in the modern era did not materialize and actually only in 1793 and that was when he declared Robespierre (Robespierre) the beginning of the reign of terror or Alrhb (Reign of terror) which lasted in France from March 10 1973_27 July 1794 where it was the execution
... Show MoreBackground: Historically the traditional medical program are divided into preclinical basic sciences course which taught separately (subject based) and clinical course which taught also as subject based, spoon feeding ,few delivery modes , no or few interactive session and the assessment solely based on examination and no weightage is given to the continuous assessment.Curricular reform: In the last few decades, there have been increasing pressures on medical educators for curriculum reform, and many accreditation bodies were established a guidelines for the medical schools. In many countries, the traditional approach has largely been modified towards a more integrated approach. An integrated approach is still subject centered but transc
... Show MoreProf.Dr. Yassin Khudair
Baghdad University
Faculty of Islamic Sciences
Department of Fundamentals of Religion
Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show MoreMany studies and researches represented the importance of the planning and designing criteria's. Planning and Designing issue influence by three factors, firstly: The Present situation of life is always exchanging and developing. Secondly: Design work represents views of problem that never appear at the beginning of the work but only by plan implementation which need to in some cases to modifying the specify aims and criteria's. Thirdly: Never establish criteria's and aims that can be used as a reference before starting design and planning process. This research will study present situation of the services for residential areas criteria's and planning legitimate in some designed cities in Iraq with different levels (neighborhood,
... Show Moreإن تجسيد الشعراء للجمال واقامته تمثالا مصورا مرئيا ، كان الهدف منه اولا اشاعة جو نفسي مريح في مقدمات قصائد المديح ، فهو الجزء البصري الممتع لمدركات حسية اخرى ترافقه، وأما المرامي الاخرى
ﻓﮭﻲ إﻣﺘﺎع اﻟﻨﻔﺲ إﻣﺎ ﺑﺎﺳﺘﺮﺟﺎع أﺟﻤﻞ ﺻﻮرة أو أﻧﻤﻮذج ﻗﺎﺋﻢ ﻓﻲ اﻟﺬاﻛﺮة، وﺟﻌﻠﮫ ﯾﺤﯿﺎ ﻣﻦ ﺟﺪﯾﺪ ﻟﺪواﻋﻲ اﻟﺤﻨﯿﻦ للاماكن والازمنة الاثيرة . أو الميل للتعبير عن الوعي الجمالي الذي يتصل بموضوع الج
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Staphylococci are common commensals in human beings, yet certain species are pathogenic. Staphylococcus aureus, particularly, is a very virulent human pathogen. The capacity of staphylococci to sense the density of bacterial cell, i.e., quorum, and thereafter respond via genetic modifications is attributable to one primary mechanism known as accessory gene regulator (Agr). Agr's extracellular signal is a peptide that is posttranslationally modified with a thiolactone molecule. Agr is in charge of the upregulation of numerous exotoxins and hydrolyzing enzymes, as well as the downregulation of many colonization determinants, under circumstances of high cell density. This modulation is critical for the scheduling synthesis of virul
... Show More