Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreThe design of the interior spaces process the product of intellectual civilization expresses the prevailing thought, discoverers of principles and beliefs through the sheen reflects the present, and generating languages graphical variety caused a different revolution in design mounting structure, and because of the complex nature of the interior spaces were and we have to be a reflection of cultural reality of being a form of cultural expression and true embodiment of scientific developments prevailing for each stage where she was born, the changes occurring in human thought and then extremism and the discrepancy tastes among individuals all communities factors have caused a change in the design structure involving modernization an
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur
... Show MorePraise be to Allah, the Lord of the Worlds.
Because it has a prominent role in the life of the Muslim person in particular, and in the stability, security, and safety of society in general, I found it appropriate to participate even a little in solving some of the problems that arise in the nation, and that Adello Badawi in this important issue that concerns everyone without exception And that I show that there are constants in the Koran, from which the scholars of the Ummah derived their evidence on this subject, and that there have been variables have occurred in some Islamic societies, in the issue of blood money that deserves the victim and his family, has allocated talk
IH Abdul-Abbas, QJ Rashid, M RasimYounus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 9
Objectives: The main objective of this study is to examine the crucial role that Russian writers and intellectuals played in catalyzing the 1905 Revolution in Russia. Specifically, the study sought to analyze how their literary works, philosophical ideas, and political writings challenged Tsarist autocracy, depicted the suffering of the masses, and inspired opposition movements. The study aimed to highlight the defiant writings that contributed to the rise of political figures and the eventual overthrow of the repressive regime. Methods: The historical narrative and analytical methods were employed, conducting a comparative analysis of prominent works by renowned authors such as Tolstoy, Gorky, and Chekhov. This analysis focused on
... Show MoreThe Research aims to determine role of The Intellectual capital in the performance of small and medium enterprises , to achieve this goal through a researcher from the theoretical literature and studies related to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted by the independent variable intellectual capital, distributed four variable are:( human capital, structure capital ,customer capital, innovation capital) as well as four variable (the financial perspective, the customer perspective, process perspective ,the learning & growth perspective) The study were getting to many results as bellow :the intellectual capital in the small and intermediate p
... Show MorePurpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show More