In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
The concept of narration stems from the connotation of continuous communication through which narration is manifested as a message that is exchanged between the sender and the recipient, and that narration is an educational conceptual necessity, representing the philosophy of intellectual inclusion achieved in a direct speech to the mind, but it is encapsulated in a colorful frame that attracts the soul and attracts attention, and the graphic narration is a speech A visual based on the basis of interference and sequence of the event in weaving the elements in a consensual way through a continuous communication process that begins with the embodiment of an event - an important event - to the recipient, in which an intellectual employment
... Show MoreMixing this strategy with a qualitative research design and an idea known as AI-supported journalism, the paper is going to approach the requirements of how AI technologies may transform journalism content and culture in a way beyond what one anticipates; therefore, enabling more of it to reach an audience. The current research used descriptive research design to investigate the potential applications of the AI tools that mediate civilizational conversation and a structured questionnaire to media professionals. AI-driven journalism can promote peaceful cohabitation and mutual respect and thus act as a bridge between cultures, the research said. The piece even goes on to mention the need for media establishments and civil soc
... Show MoreThe aim of the research is to prepare practical volleyball lessons by using the four pillars strategy for middle school students, and to identify the effect of the four pillars strategy in performing the transmission and volleyball skills in the second intermediate students, to assume that the two researchers assume that there are no statistically significant differences between the results of my skill performance tests Sending and preparing tribal and remote volleyball for the experimental and controlled groups, and there are no statistically significant differences between the results of the performance of the transmission and preparation skills of the volleyball between the two experimental and control groups, and the research co
... Show Moreervical cancer is one of the most frequently diag nosed malignancies representing the fourth leading cause of cancer-related death in females’ worldwide, with approximately 500,000 new cases diagnosed and 280,000 deaths occurring each year. Mxi1, an antagonist of c-Myc, maps to human chromosome 10q24-q25, a region altered in a substantial fraction of prostate tumors, in prostate cancer, where a high frequency of loss and mutation of the MXI1 gene has been reported. The aim of present study was to find out the possible association of exon deletion of MXI1 gene with incidence of cervical abnormalities and cancers in some Iraqi married women. The present study include collection of 120 scraping cervical cells samples from women clinically di
... Show MoreLimestones have considerable commercial importance because they are used as building stones and are widely used for flooring and interior and exterior facings. On the other hand, the reserve calculation reveals the economic effectiveness of the investigation. This study aims to calculate the reserve of the middle Miocene limestone for engineering purposes. The limestone beds of the Nfayil Formation in Central Iraq have been studied over 15 outcrop sections. The Nfayil bed has an average thickness of about 1.64 m, while the overburden has an average of about 0.93 m. The average bulk density of limestone is 2.1 gm/cm3 . Kriging and triangulation method has been adopted and used in the calculation and assessment of reserve. The industrial laye
... Show MoreBackground: The physiologic, biochemical and anatomic changes that occur during pregnancy are extensive and may be systemic or local. However, most of these changes return to pre pregnancy status six weeks postpartum. The aim of the study was to investigate the effect of dental caries among preterm postpartum women and it's relation to baby birth weight and salivary interleukin-6 (IL-6). Materials and methods: 66 postpartum women were examined, 33 preterm postpartum women (study group) and 33 full term postpartum women (control group). Dental caries was recorded using, decayed, missing and filled surfaces index, also assess the decayed lesion by severity. Salivary samples were taken from all subjects to estimate salivary IL-6 levels. Babie
... Show MoreBackground: the early identification of developmental disabilities allows intervention at the earliest possible point to
improve the developmental potential.
Objective: Identify the scope of knowledge of nurses toward signs of gross motor delay for children and its relation to
their demographic characteristics.
Methodology: A descriptive study design was conducted at (18) primary health care centers in first of the primary
health care sector of Alhawija District in Kirkuk Governorate. This study started from September 2010 to the end of
January 2011, in order to identify the level of nurses' knowledge toward signs of gross motor delay for children in
primary health care centers. Non probability (purposive) sample of
In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
Tanqua anomala (von Linstow,1904) specimens were recovered, from the lining wall of the gastro-intestinal tract of the dice snake Natrix tessellate tessellate (Laurenti, 1768) collected in Baghdad city, central Iraq. Measurements of the males, females and a comparison of the nematode with other studies tabulated. Reporting of Tanqua anomala from this snake represents the first record for Iraq as well as a new host record.
Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show More