Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More4-chloro and 4- nitro substituted phenol and aniline incorporated to a carboxylic group of naproxen a well-known non-steroidal anti-inflammatory drug (NSAID) to increase bulkiness were synthesized for evaluation as a potential anti-inflammatory agents with expected COX-2 selectivity. In vivo acute anti-inflammatory activity of these compounds (I-IV) was evaluated in rats using egg-white induced edema model of inflammation in a dose equivalent to (2.5 mg/Kg) of naproxen. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, compounds I and IV might show higher effect comparable to that of naproxen and to that of compounds II & III whic
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
The study aimed at recognizing the availability of the cultural intelligence dimensions in social studies book at the high school in the kingdom of Saudi Arabia (curricula system- joint program). The study used the descriptive approach and content analysis method. As tools of the study, the study adopted a list of cultural list of indicators and dimensions that suits the secondary stage social curricula. It further adopted a content analysis form designed to analyze the social studies book in the secondary school in the kingdom of Saudi Arabia. The study has reached several results, the most significant results were: There is a difference in including the cultural intelligence dimensions in social studies book at high school in the kingd
... Show MoreThe core interval at the K.H5\6 and K.H5\8 Wells in the West of Rutba provinces reveals a significant succession across the Late Cretaceous–Early Paleocene transition. The sampled interval encompasses a series of carbonates belonging to Digma Formation of Latest Cretaceous age, which underlies the Akashat Formtion of Danian age. Fifty-five species belonging to thirty-five genera were recognized. Based on the distribution of these species, eight biozones were distinguished, three biozones are recorded from the K.H 5\6 studied section and two biozones are documented from the K.H 5\8 studied section which refers to Late Maastrichtian age of Digma Formation. Five biozones are recorded from Akashat Formation in the K.H 5\6 studied section and
... Show MoreChaotic features of nuclear energy spectrum in 68Ge nucleus are investigated by nuclear shell model. The energies are calculated through doing shell model calculations employing the OXBASH computer code with effective interaction of F5PVH. The 68Ge nucleus is supposed to have an inert core of 56Ni with 12 nucleons (4 protons and 8 neutrons) move in the f5p-model space ( and ). The nuclear level density of considered classes of states is seen to have a Gaussian form, which is in accord with the prediction of other theoretical studies. The statistical fluctuations of the energy spectrum (the level spacing P(s) and the Dyson-Mehta (or statistics) are well described by the Gaussian orthogonal ens
... Show More