Preferred Language
Articles
/
khfT15IBVTCNdQwClMHN
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.

Crossref
View Publication
Publication Date
Thu Aug 01 2024
Journal Name
Journal Of Engineering Research
Design, analysis and development of a proton exchange membrane in fuel cell
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
The stylistics of expressive structure in Al-Sayyab's attempt- A textual study
...Show More Authors

Our research tends to study the poetic attempt of  Badr Shakir Al-Sayyab and examine it stylistically, and we suggested his mature collection '' Rain song'' as a pattern for our textual analysis of the poet's attempt.

   In the beginning , we confirm that branches of applied structures meet to produce poetry such as narration , drama , cinema , mythology , allegory , various religious and historical texts , previous events , and special cumentary events related to work production. If all above-mentioned was complicated and disregarded throughout a single text , the text writer would not secure positive results that might keep open continuity between him and his readers.

   Therefore , this issue w

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Role of the executive in federal experiences: a study of selected models
...Show More Authors

Receipt date:06/23/2020 accepted date:7/15/2020 Publication date:12/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License

The executive authority differs from one country to another, as it differs from a federal state to another according to the nature of the applied political systems, so this research focused on federal states according to their political systems, then going into the details of the executive authority and its role In the federal states by referring to the four federal experiments

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Al-adab Journal
A Feminist Rhetorical Analysis of Anti-feminist Poetry in English and Arabic
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Jan 01 2026
Journal Name
Journal Of Physical Education
A Study of Actual Training Time Administration in Bedra Specialized Weightlifting Club
...Show More Authors

View Publication
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey of deepfakes in terms of deep learning and multimedia forensics
...Show More Authors

Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 10 2022
Journal Name
Oral Surgery
Evaluation of buffered local anaesthesia in dental extraction: A randomized controlled study
...Show More Authors

Buffering of Local anaesthesia (LA) has been suggested as a mechanism to improve injection comfort and hasten the onset of anaesthesia. Aim This study aimed to evaluate the effectiveness of buffered LA in the extraction of maxillary premolars and molars. Materials and Methods This randomized controlled study included 100 patients who were indicated for extraction of maxillary posterior teeth, they were randomly divided into two groups; a study group that received infiltration of buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA, and a control group that received non-buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA. The buffering was performed using the Onset® LA buffering system (Onpharma®). The outcome va

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 04 2015
Journal Name
Environmental Earth Sciences
Isotopic study of water resources in a semi-arid region, western Iraq
...Show More Authors

View Publication
Scopus (39)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Scientific Review Engineering And Environmental Studies (srees)
Testing the performance of a solar energy cooling system in Baghdad city
...Show More Authors

Renewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref