Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Observed visually prominent lumps on the surface of the lung or embedded in lung tissue and microscopically Register Anfaj thrombosis with pulmonary carcinoma that took shape food or with the composition of the vesicles papillomavirus lining cells cubic vertical or connective tissue and increase
It has been well documented that hemodialysis patients have impaired immune response, which may result in higher prevalence rates of viral infections, including CMV. Infections in these patients may be due to primary infection or, more commonly, by reactivation of latent virus or re-infection with exogenous virus, which may be introduced by blood transfusion. The aim of this study was to evaluate the frequency of CMV-IgG and IgM antibodies among hemodialysis patients. The current research included 116 hemodialysis patients (69 male and 47 female) who attended to Tikrit Teaching Hospital for the period from beginning of October/2013 to the end of April/2014. CMV-IgG was found in 102 out of 116 (87.9%), while CMV- IgM was detected in 10 ou
... Show MoreThe employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreThe present study aimed to investigate the possible protective effect of cafestol against doxorubicin-induced chromosomal and DNA damage in rat bone marrow cells. Wistar
Albino rats of both sexes were administered cafestol (5mg/kg body weight once
This study investigates the phonological adaptation of diphthongs within English loanwords in Iraqi Arabic (IA). In contrast to earlier small-scale descriptive studies, this study used quantitative content analysis to analyse 346 established loanwords collected through document review and direct observation to determine the diphthong adaptation patterns involved in the nativisation of English loanwords by native speakers of IA. Content analysis results revealed that most GB diphthong adaptations in English loanwords in IA occur in systematic patterns and thus may be ascribed to particular aspects in both L1 and L2 phonological systems. More specifically, the results indicate that the IA output forms tend to maintain the features of the GB i
... Show MoreIn this study, dark and various light qualities (white, red, green, and blue) were applied to evaluate their effects on growth characteristics, chemical content, and callus characteristics of Rosa damascene Mill. and Rosa hybirda L.
Explant (single-node and shoot tips) cultured on MS media supplemented with sucrose, agar, and plant growth regulators ( Kin 0.5 mg/l and IBA 1 mg/l for whole plant formation experiment or 1 mg/l kin with 0.5 mg/l IBA for callus experiment), incubated in a growth chamber.
The results of the whole plant formation experiment showed variation in growth characteristics in two types of Rosa, Green and white light caused the height ratio of shoot growth compared wi
... Show MoreIn recent years, Wireless Sensor Networks (WSNs) are attracting more attention in many fields as they are extensively used in a wide range of applications, such as environment monitoring, the Internet of Things, industrial operation control, electric distribution, and the oil industry. One of the major concerns in these networks is the limited energy sources. Clustering and routing algorithms represent one of the critical issues that directly contribute to power consumption in WSNs. Therefore, optimization techniques and routing protocols for such networks have to be studied and developed. This paper focuses on the most recent studies and algorithms that handle energy-efficiency clustering and routing in WSNs. In addition, the prime
... Show MoreRecalcitrant adventitious root (AR) development is a major hurdle in propagating commercially important woody plants. Although significant progress has been made to identify genes involved in subsequent steps of AR development, the molecular basis of differences in apparent recalcitrance to form AR between easy-to-root and difficult-to-root genotypes remains unknown. To address this, we generated cambium tissue-specific transcriptomic data from stem cuttings of hybrid aspen, T89 (difficult-to-root) and hybrid poplar OP42 (easy-to-root), and used transgenic approaches to verify the role of several transcription factors in the control of adventitious rooting. Increased peroxidase activity was positively correlated with better rooting. We foun
... Show More