Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
The research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c
... Show MorePolish Academy of Sciences
Logic in the philosophy of ethical behavior in business organizations
The present study includs the isolation and identification of Keratinophilic fungi in fresh water samples collected from Tigris river in Baghdad, Iraq. Samples were collected from different districts of Baghdad (Al-Rustumia, Madina Al-Teb, Al-Azamia, Al-Kadimia, Al-Dorha and Al-Kanah). The water samples were examined for keratinophilic fungi by the plating method culturing and Hair Baiting Technique. A total number of 18 genera are recorded, in which the Tigris water indicates an impressive diversity of fungi. A variety of fungal strains were isolated from river water, out of 814 fungal colonies, Aspergillus terrus (5.5%) was the most frequent species, followed by Asperg
... Show MoreThe construction sector is considered an important and influential pivot in the national economy of any country. Nations are working to develop this sector, receiving modern and developed techniques. So, this sector can be a carrier or a receiver of modern technologies. The cost of technology transfer between the international companies that sponsor this sector is a matter of great importance, especially since different factors affect the need for this advanced technology. The cost of technology transfer in construction is related to multiple factors presented by Knowledge, equipment, plant, hardware and software. The lack of distinguishing and evaluating the direct and indirect costs in the construction sector during
... Show MoreDue to the significance of hospital drinking water, a study was done to assess the water in three hospitals in Baghdad (Al-Yarmouk Teaching Hospital, Ibn Sina Hospital, and Ibn-Al-Nafis Hospital) for its nature and quality, compare it to other hospitals in terms of its physical, chemical, and bacterial specifications, and compare it to international standards. According to Iraqi standards from 2009 and WHO standards from 2011, Chemical factors were measured, which included pH, Total Dissolved Solids (TDS), and Calcium Ion (Ca+2). Reported readings are all within acceptable ranges for drinking water. In contrast, turbidity, total hardness (T.H.), chlorides (Cl-), magnesium (Mg+2), the number of aerobic plates (APC), total coliform (T
... Show More 
Summary
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, Muhammad, and upon all his family and companions.
The circle of taboos in the Jewish Sharia is wider than other laws, as the Jews have severe and very complicated rituals in the matter of food, which may not be found among other people of other religions, as the dietary laws that specify foods and drinks forbidden in the Jewish Sharia include very diverse topics. The Torah specified all these laws with several texts
God saw his servants with truth and light, and made him easy for them, and he commanded those who help them, including a counselor, guide and preacher, so if a Muslim sees deficiencies or defects, he must help him to reform and refine it. That it was in the hands of the prophets, God Almighty created the human being together straight, then melted on those scholars and researchers in all religions on psychological counseling and religious sychotherapy, stressing the importance of religious values in the process of understanding man in the process of psychotherapy and in controlling human behavior. A lot of research and studies have been published. I dealt with the religious approach in the process of treating mental disorders and the aim of
... Show MoreThe study showed that Imam Said bin Jubair narrated in the transcriber and copied, which took most of the ink of the nation Ibn Abbas (may Allah be pleased with them), which amounted to fourteen novels.
The study also pointed out that the science of transcriber and copied is from the science of the Koran, which can only prove by the novel and the correct transmission of the Prophet Muhammad .
The study also showed that Imam Saeed bin Jubair, who says that it is permissible to copy in the Koran, contrary to what some scholars said that it is not permissible to copy.
The study also pointed to the possibility of copying and that the highest copies of the Koran Koran.