In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreAn evaluation the performance of the irrigation system for the Al-Ishaqi irrigation project for the Eastern Canal was conducted to identify management strategies that can be used to improve the operation and performance of the irrigation system. The study area is located in Salah al-Din G.0overnorate, Iraq. The field work included determining the moisture content of the soil before and after irrigation, measuring the inflow of the field to find the depth of the applied water, field monitoring, and measuring the depth of the root zone for each irrigation process. Field measurements showed that the average efficiency of water application for the two fields (A, and B) are 59.81% and 38.6%, respectively. The results of the efficiency of
... Show MoreTo identify and explore the factors nurses perceive as influencing their knowledge acquisition in relation to diabetes care and its management in Saudi Arabia.
Diabetes continues to pose major healthcare challenges despite advances in diabetes management. Nurses have a crucial role in diabetes care, but diabetes knowledge deficits deter effective collaboration with other healthcare providers in educating patients about diabetes self‐management.
An exploratory descriptive qualitative design.
Acute appendicitis is one of the commonest causes of acute abdomen. There is a wide discussion and controversy on the surgical and nonsurgical treatment of acute uncomplicated appendicitis. The aim of this study was to evaluate the efficacy and outcomes of the conservative management of selected cases of acute appendicitis with an antibiotic first plan.
This was a single hospital-based prospective study with a durat
Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreA total of (25) stool samples were collected from children and adults (2- 4) years old suffering from diarrhea to isolate E. coli strains that produce heat-stable enterotoxin a (STa), and after performing microscopic examination, cultural characterization and biochemical identification only (11) isolates showed positive E. coli. STa activity was estimated by using suckling mouse assay (SMA) and from these (11) isolates only (5) showed STa activity and the one with the highest STa activity was selected for large scale production of STa, which was followed by partial purification using ion-exchange chromatography (normal phase) using DEAE sephadex A-50 column. After purification and determination of protein concentration by using the standard
... Show MoreThe sensitivity of SnO2 nanoparticles/reduced graphene oxide hybrid to NO2 gas is discussed in the present work using density functional theory (DFT). The SnO2 nanoparticles shapes are taken as pyramids, as proved by experiments. The reduced graphene oxide (rGO) edges have oxygen or oxygen-containing functional groups. However, the upper and lower surfaces of rGO are clean, as expected from the oxide reduction procedure. Results show that SnO2 particles are connected at the edges of rGO, making a p-n heterojunction with a reduced agglomeration of SnO2 particles and high gas sensitivity. The DFT results are in
This paper discusses a comparative study to relate parametric and non-parametric mode decomposition algorithms for response-only data. Three popular mode decomposition algorithms are included in this study: the Eigensystem Realization Algorithm with the Natural Excitation Technique (NExT-ERA) for the parametric algorithm, as well as the Principal Component Analysis (PCA) and the Independent Component Analysis (ICA) for the non-parametric algorithms. A comprehensive parametric study is provided for (i) different response types, (ii) excitation types, (iii) system damping, and (iv) sensor spatial resolution to compare the mode shapes and modal coordinates of using a 10-DOF building model. The mode decomposition results are also compared using
... Show MoreThis paper proposes a neuro-fuzzy system to model β-glucosidase activity based on the reaction’s pH level and temperature. The developed fuzzy inference system includes two input variables (pH level and temperature) and one output (enzyme activity). The multi-input fuzzy inference system was developed in two stages: first, developing a single input-single output fuzzy inference system for each input variable (pH, temperature) separately, using the robust adaptive network-based fuzzy inference system (ANFIS) approach. The neural network learning techniques were used to tune the membership functions based on previously published experimental data for β-glucosidase. Second, each input’s optimized membership functions from the ANF
... Show MoreDespite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit
... Show More