In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
Record, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
Abstract
The current research aims to develop a guidance program suitable for high school students and apply it to them in order to ensure the reduction of addiction to the use of different means of communication. The researchers used the scale of addiction to the means of communication (SAS) to measure the level of addiction as well as to identify the impact of the proposed guidance program in reducing the degree of addiction to communication. It was applied to a sample of (20) female students divided equally into two groups: an experimental group of (10) female students and a control group of (10) female students from the secondary level in a school under the department of education in the education of the alma
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreThis study investigated a novel application of forward osmosis (FO) for oilfield produced water treatment from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). FO is a part of a zero liquid discharge system that consists of oil skimming, coagulation/flocculation, forward osmosis, and crystallization. Treatment of oilfield produced water requires systems that use a sustainable driving force to treat high-ionic-strength wastewater and have the ability to separate a wide range of contaminants. The laboratory-scale system was used to evaluate the performance of a cellulose triacetate hollow fiber CTA-HF membrane for the FO process. In this work, sodium chloride solution was used as a feed solution (FS) with a concentratio
... Show MoreViolence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.
The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas
... Show MoreThe objective of this study is to highlight the skills of office managers and it's impact on the effectiveness of time management in the institutes and faculties of middle technical university and a group of cognitive and practical aims. The managers skills forms mthe modern trend and the main source to provide organizations with highly skilled managers with distinctive performance and because of the sharp changes in the environment which today's organizations works in it , business organizations generally and managers especially realise the importance of time management and it's role in achieving competitive advantage . The problem of this study raised from this point which reflect the extent of departments managers realisation
... Show MoreOne of the most common procedures in oral surgery is the removal of impacted mandibular third molars, often followed by pain, swelling, alveolitis, and trismus. Purpose. To compare the outcomes of the intrasocket application of 1% hyaluronic acid oral gel (HA) and advanced platelet-rich fibrin (A-PRF) on the expected postoperative complications, pain, swelling, and trismus follow the surgical extraction of the impacted mandibular third molar. Material and Methods. A randomized controlled trial was conducted at the Oral and Maxillofacial Surgery Unit, Dental Teaching Hospital. Healthy patients who required surgical removal of the impacted mandibular third molar were divided randomly into three groups. The extraction site of the group
... Show MoreThis research addresses the relevance of men and women and the consequent provisions
such as dowry and alimony ... Of the like, marriage is to organize links masculinity and
femininity any sexual meeting between men and women a special system that must be
produces reproduction him and alone, which gets its reproduction in human kind, and has no
family and on the basis of private life is being organized.
The importance of the topic see Islam has urged marriage and forbade celibacy, and ensure
that the Lord of Glory Almighty married subsidy nor the origin of the differences between
men and women in money or workmanship or blue-chip Every Muslim inept any Muslim and
every Muslim efficient for any Muslim.
The impor
Summary
The subject ( meaning of added verbs) is one of the main subjects
which study in morphology since in Arabic language. It is include the meaning
of each format, and the increased meaning occurred by this increment in the
verbs.
The (strain) is one of very important meaning in this subject, it takes a
wide area of morphology studies, and interesting of scientists and
researchists.
There are two famous formats for this meaning; (infa la انفع
ل ), and (ifta
la افتع
ل ). Also There are another formats for the same meaning, but less than
the first two in use, they are; (taf ala تفعّ
ل ), (tafa ala تفاع
ل ), (taf lala ) ,(تفعل
ل
ifanlala افعنلل ), (ifanla .(