Preferred Language
Articles
/
JBfoV5MBVTCNdQwCIdFo
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Al–bahith Al–a'alami
The role of witchery and astrology programs in spreading illusion and myth
...Show More Authors

« The emergence of satellite channels has led to fundamental changes in the supposed role of television, making it a center of culture and an important tributary to social upbringing and influencing the attitudes and values of individuals and in making public opinion regarding various issues, some television programs target ordinary people at home by virtue of the nature of their subjects, where there is a large audience of viewers, who consume and absorb what is offered to them from the cultural production of those satellite channels that play with the aspirations of groups of society to find metaphysical or magic solutions to their social problems or psychological delusions. The media, through its various messages, contributes to brin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2012
Journal Name
The Iraqi Journal Of Veterinary Medicine
Conformation of the clinical diagnoses of some malnutrition diseases in local and Shammi goats in Baghdad province: Al-Shawi A.F.S .; Al-Sammarraie ,S.A.G.and Al-Judi Abdul,M.H.
...Show More Authors

The relationship between the clinical singes and some of the hematological and biochemical values in 126 cases of local breed and Shammi breed goats (from both sexes) diagnosed as cases of malnutrition from 230 goats examined .The clinical examination include (beside the general inspection and case history) body temperature, respiratory and pulse rates, mucus membranes skin and coat. Examination of the blood samples included RBCs count, Hb concentration, PCV % and values of cupper, magnesium, phosphorus, and potassium. The results showed that the mean body temperature of these goats was lower than in normal goats, while the respiratory and pulse rates were higher .Examination of blood revealed decrease in the means of RBCs counts ,Hb con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Watermarking in Medical Image
...Show More Authors

Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Oct 06 2014
Journal Name
Journal Of Educational And Psychological Researches
sexual stereotyping in Kindergarten
...Show More Authors

The current research aims to know the sex-stereotyping among Kindergarten , male and female, study was conducted on a sample of 400 boys and girls by (200) males and  (200), females Kindergarten  from age (4-6 years) in the province of Baghdad, for the , academic year (2013-2014) In order to achieve the goals of research, the researcher built two scales measure of the prototypical male sexuality and a measure of the prototypical female sexual and be in its final form of (36) items to measure sexual stereotyping male (35) items to measure sexual stereotyping of females, were sure of the validity scale by presentation to a group of experts as well as the Statistical analysis of the resear

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Al-kindy College Medical Journal
Furosemide in Hypovolemic shock
...Show More Authors

Background: Shock is a common clinical state, we face chocked patients in causality, surgical and gynecological  specialties like stab wounds, road traffic accidents, placenta preavia, placenta accrete, placenta pericreta, ectopic pregnancy, perforated viscus  etc. All such patients undergo surgical exploration and majority of them are shifted to ICU to complete monitoring and support. High percent of them they develop acute kidney injury intra and postoperatively and carry high mortality rate because of not so good nursing care in ICU in Iraq.

Objective: to clarify that Furosemide can protect kidney function during shock and reduce ICU admission and mortality rate.

Method: 100 shocked patient were enrolled in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 05 2022
Journal Name
Al-kindy College Medical Journal
Spinal Tuberculosis in Children
...Show More Authors

Tuberculosis continues to be the leading cause of morbidity and mortality, with an estimated annual incidence of 10.4 million worldwide. It has been estimated that 10% of patients with extrapulmonary tuberculosis have musculoskeletal involvement, with the spine being the most common. Spinal tuberculosis (TB) accounts for 50% of cases of musculoskeletal tuberculosis.

Spinal tuberculosis is the result of infection with Mycobacterium tuberculosis. It is a secondary infection, the primary lesion of which is in the lungs, genitourinary system, or gastrointestinal tract and can be active or latent. Involvement of the vertebral segment is the result of hematogenous spread of infection along the arterial pathway or Batson's vei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Schematic Coherence in Poetry
...Show More Authors

Schemata are the underlying connections that allow new experience and information to be aligned with previous knowledge. When one reads a text he usually uses all his levels of schemata. Schemata enable us to make sense of what is perceived and experienced in the world.

In poetry, readers usually examine carefully and deeply what they are reading in comparison with other sorts of discourse. Coherence is achieved when a reader perceives connections among schemata. It is a connection between linguistic and textual features of the text, and reader's mental expectations as well as stored knowledge of the world. This paper discusses the role of schematic correlation in poetry, and the effect of different schematic background and diffe

... Show More
View Publication Preview PDF