In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments
The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreAbstract Depending on their protective properties against different cases of Colorectal Cancer (CRC), vitamins C, D, and E are the main focus of this research. CRC is one of the global public health concerns. 30 healthy individuals provided serum samples, whereas the group of CRC patients was divided into three, totaling 90 individuals. Group I consisted of 30 newly diagnosed cases of CRC. Group II 30 consisted of consisted of 30 CRC patients who were administered three cycles of chemotherapy. Group III consisted of 30 diagnosed CRC patients who also have non-alcoholic fatty liver disease (NAFLD). The concentrations and groups of vitamins C, D, and E were evaluated using ELISA. The levels of Vitamin C were significantly lower (p &l
... Show MoreThe study aims at measuring the dimensions of binding and non-binding social responsibility and its relation to the organizational performance in telecommunication companies in the Republic of Yemen using analytical descriptive approach and questionnaire as a main tool for data collection and comprehensive inventory method.
It has been found that there is a positive effect and significant moral relation between social responsibility with its binding and non-binding dimensions and the organizational performance of telecommunication companies in the Republic of Yemen at a level of significance below (0.05). It has also been found that the correlation between the non-binding social responsibilit
... Show More