Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
The poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti
... Show MoreThe e-commerce is one of the best achievements of the twentieth century, since the conduct commercial transactions via the Internet may be the consumer easy selection process and purchase convenient manner different from traditional methods, and with the beginnings of the new millennium impose the emergence of e-commerce term significant challenges to the insurance industry as an important economic sectors Generally, and insurance companies in particular as a result of scientific development, which has led to a reduction in costs and innovation in the production, which led to intense competition on both levels local or global. The insurance industry is a vital part of the economy and it has a varied impact to the community and individual
... Show MoreThe research aims to measure the net nominal protection coefficients for the products table eggs and poultry meat and the extent of its impact on domestic production volume for the period of 1990- 2013 has been the use of mathematical formulas simplified in the calculation of the transaction process with a view to the extent of support and protection offered by the state pricing policy for products Resources Sector Animal in Iraq and reach search Highlights and most important, there are volatile price state policy with regard to eggs and poultry meat, as it ranged net nominal protection coefficients between the larger and less than the right one, which means that values are unstable to support local producers or consumers, and can be The
... Show MoreAbstract
The purpose of the present paper is to light on the relationship between jobs design, analysis and its reflections on reinforcing workers' vocational adjustment. The present paper aims to accomplish cognitive and applied goals, top of which, test of functional analysis ability to have effect upon workers' vocational adjustment via job design directly and indirectly owning to the virtual factor practiced by these practices on the sought organization. The problem of the present paper comes with many, the most important is the of how to bolster and back up worker's technical adjustment through good and accurate design for the job.
Based on this problem and goals as to expla
... Show Moreتمهيد
غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.
ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التط
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThe current research aims at testing test the relationship and the impact of strategic leadership (strategic vision, Core competencies , human capital, organizational culture and Ethical practices) in the talent management (to attract talent, performance management talent, developing talent and retain talent) among managers in the Ministry of Science and Technology Iraq, and figuring out a number of recommendations to the ministry to help achieve its desired objectives, and to clarify the relationship between the variables to find the main and secondary aim of the research two major hypotheses have been formed which split into ten sub-hypotheses. Collecting data on a form questionnaire has been relied on as an essenti
... Show MoreThrough the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in t
... Show More