Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
The Islamic religion is a religion of tolerance and is pleased with worship and other legislation and the idea of peace is an authentic and profound idea related to the call for coexistence with all religions. The Prophet (PBUH) was keen to organize his relations with non-Muslims on the basis of cohabitation, On the basis of love and intolerance, God Almighty says: "If your Lord wants to make people one nation and they are still backward." Surah Hud: 118 Islam has taken care of the people and made them tolerant brothers who sympathize with their different beliefs. Which means that everyone has the right to live, believe and believe what he sees right and have the freedom to perform the acts of worship and beliefs he deems correct. The di
... Show MoreAcute lung injury (ALI) is a state of inflammation that breaks down the lung endothelial and epithelial cell barriers. In the current study, we investigated the role of resveratrol (RES) in regulating the expression and functions of tight junction proteins (TJP) in epithelial cell responses following exposure to this superantigen. To this end, C3H mice were given resveratrol orally twice prior to intranasal challenge with lethal SEB doses. 16S rRNA results showed that there were microbes transported in the blood in addition to the lung and colonic tissues. For this purpose, we used a reporter E. coli-GFP labeled bacterium to monitor and examine the viability of this bacterium in case
The art has been turned its subject in the post modern thinking . this turning is aresult to the turning in the role of the art it self. Across its history the art was basing its subject on a universal unite it the phenomenenon which is the most elevated . that the artist try to activate the role of the subject as a axial which compose the plastic art them. Because of the history of art full with subjects which consider in alarg part of it, have relation ship with elite and aesthetics , and from the begening of renaissance the central activity of the art was based on opoint which has concentrated reaction or it going in away belong to the state in that time.so renaissance was in relegous axial and romantisim on a dream axial, classisisim
... Show MoreThe tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).
The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?
The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the
... Show MoreThe multimetric Phytoplankton Index of Biological Integrity (P-IBI) was applied throughout Rostov on Don city (Russia) on 8 Locations in Don River from April – October 2019. The P-IBI is composed from seven metrics: Species Richness Index (SRI), Density of Phytoplankton and total biomass of phytoplankton and Relative Abundance (RA) for blue-green Algae, Green Algae, Bacillariophyceae and Euglenaphyceae Algae. The average P-IBI values fell within the range of (45.09-52.4). Therefore, water throughout the entire study area was characterized by the equally "poor" quality. Negative points of anthropogenic impact detected at the stations are: Above the city of Rostov-on-Don (1 km, higher duct Aksai) was 38.57 i
... Show MoreThe need for cloud services has been raised globally to provide a platform for healthcare providers to efficiently manage their citizens’ health records and thus provide treatment remotely. In Iraq, the healthcare records of public hospitals are increasing progressively with poor digital management. While recent works indicate cloud computing as a platform for all sectors globally, a lack of empirical evidence demands a comprehensive investigation to identify the significant factors that influence the utilization of cloud health computing. Here we provide a cost-effective, modular, and computationally efficient model of utilizing cloud computing based on the organization theory and the theory of reasoned action perspectives. A tot
... Show MoreOptimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment
... Show MoreIn the last years, the research of extraction the movable object from video sequence in application of computer vision become wide spread and well-known . in this paper the extraction of background model by using parallel computing is done by two steps : the first one using non-linear buffer to extraction frame from video sequence depending on the number of frame whether it is even or odd . the goal of this step is obtaining initial background when over half of training sequence contains foreground object . in the second step , The execution time of the traditional K-mean has been improved to obtain initial background through perform the k-mean by using parallel computing where the time has been minimized to 50% of the conventional time
... Show MoreThe printed circuit heat exchanger is a plate type heat exchanger with a high performance and compact size. Heat exchangers such as this need a unique form of bonding and other techniques to be used in their construction. In this study, the process of joining plates, diffusion bonding, was performed and studied. A special furnace was manufactured for bonding purposes. The bonding process of copper metal was carried out under specific conditions of a high temperature up to 700 oC, high pressure of 3.45 MPa, and in an inert environment (Argon gas) to make tensile samples. The tensile samples are cylindrical shapes containing groves representing the flow channels in the printed circuit heat exchanger and checking their tensile st
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show More