Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
This paper tackles in detail the functional shift of parts of speech, such as the shift of a verbal clause to an adjectival clause, along with the types of such a shift. The researcher identified the important features of participles, as well as the concept of participles, adjectives, and their types. Also, the most important changes that affect the participles during such shifts. Further, an exposition is made of the different producers through which a verbal clause is changed into an adjectival one in Russian.
This type of functional shift in parts of speech is seen as a process of deriving most of the new words in contemporary Russian. Russian is very rich in new words, whether by way of processe
... Show MoreTwo series of 1,3,4-oxadiazole derivatives at the sixth position of the 2,4-di-
New derivative molecular absorption spectrophotometric methods have been developed for the determination of Al (III) , Mn (II) , individually and binary mixtures . The aim of this model of study is to obtain analytical results characterized by adequate standard of analytical figures of merits through application of derivative Spectrophotometry (dnA/d?n). The two metals acetyl acetonates are chemically stable and are widely used as catalysts . Where Interferences are probable due to very close or nearby peaks or Summits, the Zero – Crossing derivative measurement technique is used to avoid interfering effects between two metals pairs.
The present work presents design and implementation of an automated two-axis solar tracking system using local materials with minimum cost, light weight and reliable structure. The tracking system consists of two parts, mechanical units (fixed and moving parts) and control units (four LDR sensors and Arduino UNO microcontroller to control two DC servomotors). The tracking system was fitted and assembled together with a parabolic trough solar concentrator (PTSC) system to move it according to information come from the sensors so as to keep the PTSC always perpendicular to sun rays. The experimental tests have been done on the PTSC system to investigate its thermal performance in two cases, with tracking system (case 1) and without trackin
... Show MoreCyprinidae species are the most abundant and widely distributed fish species in the inland waters of Iraq. Cyprinids are complex species, and it is difficult to identify them on the basis of morphology. Thus, the morphological characteristics must be achieved and confirmed by molecular analysis. Twenty specimens of Cyprinion kais Heckel, 1843 (Piscies, Cypriniformes, Cyprinidae) were collected from two localities at Tigris River in the middle of Iraq: five specimens from Al-Tharthar Lake, Saladin Province, and 15 specimens from Al- Zubaydiyah sub-district, Wasit Province. The DNA sequences of C. kais were done using the mitochondrial DNA cytochrome b (cytb) gene. After analysis, the sequences were compared with sequences of ot
... Show MoreIn this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper