Preferred Language
Articles
/
jBcdPo4BVTCNdQwCqD4w
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.

Crossref
View Publication
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Biotechnology Research Center
Candida and Candidiasis - A review of Virulence Factors
...Show More Authors

   The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 26 2025
Journal Name
Microbial Science Archives
Listeria monocytogens: A review of its characteristics, pathogenicity and prevalence in Iraq
...Show More Authors

Listeria monocytogenes represents a critical foodborne pathogen causing listeriosis, a severe infection with mortality rates of 20- 30%. This comprehensive review integrates cutting-edge research from 2015-2024 with Iraqi epidemiological data to address significant knowledge gaps in regional surveillance and global comparative analysis. Recent discoveries include five novel Listeria species in 2021, revolutionary whole genome sequencing (WGS) surveillance systems, and advanced understanding of RNA-mediated regulation. Iraqi prevalence data reveals concerning patterns with rates ranging from 3.5% to 93.8% across different sample types, substantially higher than global averages. Critically, Iraqi isolates demonstrate alarming antibiotic resis

... Show More
Preview PDF
Publication Date
Wed Oct 25 2023
Journal Name
Urban Planning And Construction
A Review on Urban Planning and Its Role in Managing Flood Risks
...Show More Authors

This review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PATTERN OF INVESTMENT PROJECTS IN THE INVESTMENT ENVIRONMENT: PATTERN OF INVESTMENT PROJECTS IN THE INVESTMENT ENVIRONMENT
...Show More Authors

That the building of the national economy depends on the extent of the possibility of transition from the rent economy seeking to increase GDP (GDP1), and the tendency to manage projects with external sources of funding, or allow projects with foreign capital is a necessity. The strategic challenges faced by the economy in countries that have experience in investment projects have faced several factors internal and external for a period of time and not a few and the pressures and difficulties and failures have affected in one way or another on the development work in that country. On this basis, the stakeholders have a role to pay attention to the issue of the feasibility of the pattern of foreign investment in the investment environment

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Characteristics of Environment in Contemporary Iraqi and Iranian Pottery A Comparative Study (Saad Shakir- Muhammad Mahdi) A Model: قحطان عدنان محمود
...Show More Authors

The Iraqi and Iranian pottery has a significant role in the contemporary world pottery space, despite the fact that influences created those formulation, thus the researcher supposes that there is a relation between the potter and his environment within Iraq's environment and Iran's environment, which are similar at times and different at other times. The researcher, hence, found himself in front of a number of questions:
1- How much was the Iraqi potter inspired by the environment compared to the Iranian potter?
2- Has the Iraqi and Iranian pottery been really inspired by the environment items or there were modified metaphors?
The current research aims at (identifying the influential environmental characteristics in the Iraq

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Employing the results of evaluating employees'performance in achieving organizational integrity Field study at the Technical Institute in Mosul
...Show More Authors

The objective of the study is to study how to employ performance evaluation in achieving organizational integrity and the impact of performance evaluation on achieving organizational integrity. In light of this, the following questions were raised:

Are the dimensions of organizational integrity available in the field in question?

In order to answer the research questions, a questionnaire questionnaire was distributed to the sample of 30 members of the teaching staff at the Technical Institute in Mosul. The three-dimensional Lycert scale was used. The statistical methods were used, ie, the frequency distribution, the computational circles, the standard deviations, Pearson), simple

... Show More
View Publication Preview PDF
Crossref