Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThis research aims to predict the value of the maximum daily loss that the fixed-return securities portfolio may suffer in Qatar National Bank - Syria, and for this purpose data were collected for risk factors that affect the value of the portfolio represented by the time structure of interest rates in the United States of America over the extended period Between 2017 and 2018, in addition to data related to the composition of the bonds portfolio of Qatar National Bank of Syria in 2017, And then employing Monte Carlo simulation models to predict the maximum loss that may be exposed to this portfolio in the future. The results of the Monte Carlo simulation showed the possibility of decreasing the value at risk in the future due to the dec
... Show MoreThe current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe current research seeks to achieve several objectives, including knowing the extent of the audit directorate of the Ministry of Construction, Housing and General Municipalities of the International Standard (ISO19011:2018) regarding determining the efficiency and evaluation of auditors and diagnosing the gap between requirements and application and knowing the reasons for not applying some of the items in the standard, starting from the problem, The field raised the following question (Does the audit directorate determine the efficiency and evaluation of auditors according to the standard ISO19011:2018?), and the importance of research lies in determining the return that can be achieved by the directorate through its application of stand
... Show MoreThe aim of the research is to use this technique and to determine the effect of this method in reduce cost per unit of the company. The traditional method used in the company the research sample to determine the indirect costs, the definition of the concepts and characteristics of the method of cost-based activity and the cost method based on time-driven activity and justifications applied to companies. In order to achieve the research objectives, the main hypotheses were formulated. That was represented: (The applied of (TDABC) Time driven activity based costing method in reducing indirect costs, leads reduce cost per unit than the use of the traditional method of allocating indirect costs in the research sample company).&nb
... Show MoreThe present study is considered a pioneer investigation that deal with the terrestrial brown garden snail Cornu aspersum (Müller), in Iraq. Cornu aspersum however is considered an exotic species in many parts of the world ,The species is most probably infiltrates with plants transferred from one place to another. The species has gained importance in many ways. Nutritionally, the species is consumed as food item in many countries, but in other cases it is considered as pest for the damage it causes when feeding on valuable plant shoots. It also has medical importance for its role and ability in healing wounds, burns and remedy of other skin problems. This snail species however may act as a vector for some parasitic nematodes that
... Show MoreBackground: Propolis has received great interest because of its wide range antimicrobial activity. Propolis also called (bee glue) due to its collection by (Apismellifera) honeybees from various plants resinous substance. The aim of this study was to determine the antibacterial effect of propolis extracts (aqueous and alcoholic) on anaerobic periodontal pathogen namely Aggregatibacteractinomycetemcomitans. Materials and Methods: Strains of Aggregatibacter actinomycetemcomitans wasisolated from pockets of systemically healthy patients aged between 35-55 years old suffering from chronic periodontitis with pocket depths of 5-6 mm, the bacteria cultured on special blood Agar plates solid media. Propolis was extracted by using water and alcohol.
... Show More