Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Water pollution has created a critical threat to the environment. A lot of research has been done recently to use surface-enhanced Raman spectroscopy (SERS) to detect multiple pollutants in water. This study aims to use Ag colloid nanoflowers as liquid SERS enhancer. Tri sodium phosphate (Na3PO4) was investigated as a pollutant using liquid SERS based on colloidal Ag nanoflowers. The chemical method was used to synthesize nanoflowers from silver ions. Atomic Force Microscope (AFM), Scanning Electron Microscope (SEM), and X-ray diffractometer (XRD) were employed to characterize the silver nanoflowers. This nanoflowers SERS action in detecting Na3PO4 was reported and analyzed
... Show MoreThe research deals with financial and supplies support from the rulers and governors of the
Arab cities and Islamic regions to the poor of common people and the poor of their own . The
Islamic Arab community was characterized , since the prophet's era , with great humanistic
features that formed the cultural characteristic which organized individual's economic life .
The prophet , senior Muslims and the rich cared a lot about this side . There was a large
variation in the degrees of wealth and poverty in the Muslim Arab community as a heritage
from the pve – Islamic society where there is no concern about helping the needy and poor .
Thus , the research sheds light on the different forms of help offered by rulers a
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).