Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThis study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value
... Show MoreThe current study discusses one of the most important modern schools in art, and it studies its impact on contemporary Iraqi art, particularly in the art of pottery because of its association to the utilitarian function. However, this study demonstrated that pottery is a unique art, which has exceeded the limits of this function. In addition, pottery has a great role in changing the view and understanding of it. Therefore, this art assists in achieving the concepts, philosophies, and values among other fine arts branches.The most prominent issues in this article is dealing with reflections of the cubical arts on the Iraqi contemporary pottery art by through the works of the most prominent contemporary artists such as (Saad Shakir, SHania
... Show MoreAbstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.
Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t
... Show MoreBackground: The COVID-19 pandemic has an immense effect not only on the social and economic lives of people but also on the surgical lives of surgeons, residents, nursing staff, and patients as well as ground level staff. Amidst this COVID pandemic, emergency surgeries were being done but at a decreased rate, whereas elective cases depended on the will of hospitals, surgeons, and patients. Study aims to promulgate a "Neo–Surgical Check Box" by amalgamating the WHO surgical checklist and the results obtained from the questionnaires.
Subjects and Methods: After receiving ethical clearance from the Institute Ethical Committee, an online questionnaire with 50 questions divided into
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show MoreThe relationship between music and plastic arts can be viewed as an interdependent relationship, as they both develop imagination, focus and sensory perception, as well as the presence of some artistic concepts that music shares with the art of drawing, on this basis the rationale for this research aimed at identifying (the influence of music) was dealt with On the artistic output (drawing) of students of the Department of Art Education - College of Fine Arts) In the first chapter the problem of research, importance, terminology, boundaries and goal was addressed, and in the second chapter the researcher dealt with in the first topic the relationship between music and painting, and in the second topic the use of music in education. As fo
... Show More