In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
That the building of the national economy depends on the extent of the possibility of transition from the rent economy seeking to increase GDP (GDP1), and the tendency to manage projects with external sources of funding, or allow projects with foreign capital is a necessity. The strategic challenges faced by the economy in countries that have experience in investment projects have faced several factors internal and external for a period of time and not a few and the pressures and difficulties and failures have affected in one way or another on the development work in that country. On this basis, the stakeholders have a role to pay attention to the issue of the feasibility of the pattern of foreign investment in the investment environment
... Show MoreBiodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .
Recently The problem of desertification and vegetation cover degradation become an environmental global challenge. This problem could be summarized as as the land cover changes. In this paper, the area of Al- Muthana in the south of Iraq will be consider as one of Semi-arid lands. For this purpose, the Ladsat-8 images can be used with 15 m in spatial resolution. In order to over Achieve the work, many important ground truth data must be collected such as, rain precipitation, temperature distribution over the seasons, the DEM of the region, and the soil texture characteristics. The extracted data from this project are tables, 2-D figures, and GIS maps represent the distributions of vegetation areas, evaporation / precipitation, river levels
... Show MoreThis study aims to identify changes in vegetation cover and its impact on the climate of Mosul City. The analytical method of the study relies on changes in Land Use/Land Cover (LULC), Normalized Difference Vegetation Index (NDVI), and Land Surface Temperature (LST); GIS technology was used to measure these statistics. Landsat (5,8) imagery was used to detect the change in vegetation cover change and land surface temperature during the study period from 2010 to 2022, where the unsupervised classification technique was used to determine LU variations. The results revealed significant changes among the LU classes during the study period, primarily due to human activities. The most prominent change in LU was the urban expansion of agricultural
... Show MoreThe research problem is that the traditional methods of internal auditing are somewhat heavy with long and rigid procedures for the members of the audit process team, especially in light of the current developments that are reflected in the business environment and internal audit reports, so it is necessary to reconsider the traditional internal audit work method and assess the extent of its development by agile methods to reduce the time of the audit process on the activities and elements that add value and direct the effort and time to the activities and elements that add value to the work of the economic unit and the report of the internal auditor.
The research aims to study the possibility of applying agile internal auditing
... Show MoreThis study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio
... Show MoreElectronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreThe impact of the auditor's personal judgment starts from the beginning of the audit process to the formation of the final opinion and the issuance of the report, and because of the possibility of bias in the auditor's judgment for various reasons that may relate to the auditor himself or the circumstances surrounding it, which requires assessing the current reality of the auditor's personal judgments In the local environment and determining their determinations. To clarify the concept and determinants of the auditor's personal judgments when implementing the audit work, prepare the report and determine the role of the international auditing standards in rationalizing the auditor's personal judgment when conducti
... Show MoreThe study aims to indicate the role of the agricultural initiative in building agricultural development, mediated by activation of the role of internal and external audit on agricultural initiative projects, for the purpose of meeting the challenges of abuses on agricultural land and lack of water used in agriculture and proportions of high poverty, which led to the rural people of the migration to the city and leave agriculture and livestock, and that of the main conclusions reached by the researcher. When comparing the work of the external auditing agencies (the Federal Office of Financial Supervision) on the initiative of agricultural projects with internal audit services in the Directorate of Agriculture and branches of the Agricultu
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show More