Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Research on the automated extraction of essential data from an electrocardiography (ECG) recording has been a significant topic for a long time. The main focus of digital processing processes is to measure fiducial points that determine the beginning and end of the P, QRS, and T waves based on their waveform properties. The presence of unavoidable noise during ECG data collection and inherent physiological differences among individuals make it challenging to accurately identify these reference points, resulting in suboptimal performance. This is done through several primary stages that rely on the idea of preliminary processing of the ECG electrical signal through a set of steps (preparing raw data and converting them into files tha
... Show MoreThe research aims to verify the role of the Human Resources Strategic Management (HRSM) in enhancing the strategic success factors for talent (SSFT) in the General Tourism Authority by distributing a questionnaire consisting of (36) paragraphs on an intentional sample represented by the higher departments as it reached (50) and the sample valid for testing was (44) Person and to test the relationships between the two research variables, the researchers used statistical methods represented by (Bartlett test / mean / simple regression coefficient / difference coefficient, alpha- cronbachAch, confirmatory factor Analysis ) through the statistical program (SPSS v.23 & AMOS v.23). In enhancing the factors of success for talent management in the
... Show MoreThe aim of this study was Identifying the relation of coordination and kinesthetic perception with artistic performance level in gymnastics skills for students in second class from the college of physical education/ university of Baghdad/ Al - jadreia .The searchers have been used the descriptive method in scanning style .The subject of this search has been taken (45) female - student in second class from the college of physical education/ university of Baghdad . The searchers have reached into specific conclusions concerning with statistic analysis about immoral joint relation between sensitive- kinetic coincidence and realization and with Artistic Performance Level in Gymnastics Skills for Women for second class .The an important recommen
... Show MoreThe business environment is witnessing tremendous developments in the field of production and technology, which requires the development of production methods to go in line with these developments and the increasing competition, which has gone beyond the economic aspects to extend to the environmental aspects, as economic units tended to adopt a cleaner production strategy and through what they achieve by producing environmentally friendly products and achieving economic efficiency. Reducing costs, providing a safe and clean environment for workers, and reducing waste from production operations.
Residential complexes have witnessed a great demand in most countries worldwide, as they are one of the main infrastructure elements, in addition to achieving a developed urban landscape. However, complex residential projects in developing countries face various factors that could be improved in their implementation, especially in Iraq. Sixty-two experts in residential complex projects were interviewed and surveyed to verify these projects' failure factors,. Fifty-one factors were the main failure factors, divided into four main components (leadership, management system, external forces, and project resources). The Relatively Important Index (RII) is used to determine the relative importance factors and obtain the top tw
... Show MoreThe study involved 45 male and 45 females of diabetic patients type- ?? aged from 40-69years , and with the same numbers of males and females for control , all the patients and controls were without any periodontal diseases and without any systemic disease. Diabetic patients were divided in to three groups according to the degree of periodontitis , and the inflamed gingiva of all groups of diabetic patients were treated with the dried fruits powder (crude) of medicinal plants Quercus robur , Thuja occidenalis , Terminalia chebula, Anethum graveolens , respectively and mixture. Some immunological and antimicrobial factors (IgA, Lactoferrin , Lysozyme ) , were detected in serum and saliva of diabetic patients and the control
... Show MoreVision loss happens due to diabetic retinopathy (DR) in severe stages. Thus, an automatic detection method applied to diagnose DR in an earlier phase may help medical doctors to make better decisions. DR is considered one of the main risks, leading to blindness. Computer-Aided Diagnosis systems play an essential role in detecting features in fundus images. Fundus images may include blood vessels, exudates, micro-aneurysm, hemorrhages, and neovascularization. In this paper, our model combines automatic detection for the diabetic retinopathy classification with localization methods depending on weakly-supervised learning. The model has four stages; in stage one, various preprocessing techniques are app
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreMost of the mosques in the Islamic world fall under specific and known forms and patterns to a large extent, and such patterns have grown and evolved from the few basic and uniform models, but they changed slowly due to the impact with a mixture of changing functional requirements and cultural landscapes because of the variables of time and place to form patterns known and famous in this day across parts of the Islamic world and its borders. There was no exception to these patterns, but small numbers of mosques that were probably the result of personal experiences or improvisational resolutions, or in response to specific or temporary stimuli. However, the emergence of a specific pattern which does not belong to any of these patt
... Show More