In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
During the study the current selection seven stations in the Zab River bottom and the Tigris River took samples a month to study the signs of bacterial contamination study coliform and colon fecal Almsobhaat and Almsobhaat Bazah and the total number of bacteria and bacterial gangrene gas causing Knkeran as well as a study to isolate and diagnose some races and types of bacterial pathogens in water or intensityusing the traditional system and the system of intestinal bacteria
Pseudomonas aeruginosa is a common and major opportunistic human pathogen, its causes many and dangersinfectious diseases due to death in some timesex: cystic fibrosis , wounds inflammation , burns inflammation , urinary tract infection , other many infections otitis external , Endocarditis , nosocomial infection and also causes other blood infections (Bacteremia). thereforebecomes founding fast and exact identification of P. aeruginosafrom samples culture very important.However, identification of this species may be problematic due to the marked phenotypic variabilitydemonstrated by samples isolates and the presence of other closely related species. To facilitate species identification, we used 16S ribosomal DNA(rRNA) sequence data
... Show MoreScientific research on the environment of the Iraqi marshes, its beauty and its characteristics is considered one of the most important functions of Iraqi universities and scientific institutions, because of its great historical impact related to the identity of Iraq and the Iraqis and the basis of science and science, through which the first letter and the first human civilizations were established and in the same importance technical research is among the most important functions of departments Institutes and colleges of the arts, research centers and museums inside and outside Iraq. Also, research centers specialized in the natural environment of Iraq, including the marshes. Therefore, it is hoped that this research will develop the a
... Show MoreThis study aims to investigate the degree of practicing the motivated classroom evaluation environment for learning and its relationship to different feedback patterns. To achieve the objectives of the study, the correlational descriptive research design was employed. A questionnaire was constructed consisting of two parts: the classroom evaluation environment (13) items, and feedback patterns (24) items on a five-point scale. The psychometric properties of the questionnaire were verified in terms of validity and reliability. The questionnaire was applied to a sample of (265) male and female teachers who work in the second cycle schools for grades (5-10) of basic education in all academic majors in the Governorate of Muscat in the Sultan
... Show MoreThe importance of this research comes from the possibility of achieving positive interaction between accounting and tax through the interest in setting accounting standards and adapting them to local tax legislation, as the adoption of the application of the international standard (IAS 12) for income taxes helps to measure and determine the base for income tax and may lead to an increase in the tax outcome. Through the reliance of enterprises on many accounting bases, and that the tax administration in Iraq depends on the element of personal judgment in determining the tax base, which leads to lack of objectivity in determining the tax outcome, as the impact of the accounting standard (IAS 12) on the tax base and tax outcome is one of th
... Show MoreAbstract
The goal of the research is to diagnose some of the negative phenomena which was discovered through the period from (2010 to 2014) as determined by the national strategy to eliminate the corruption which was set out by the joint council of the corruption elimination in Iraq. And to measure the gap in applying the legal rules by the administration, concerning the misconducts and felonies upon the state employments made by the state employee and how far they are applied in the studied sample and to show the nature of the rules and their importance and their role when they are applied in scientific and expertise manner. And to encourage the offices of the general supervisors to adhere to them which will lead t
... Show MoreThe research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThis paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.