Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Racism changes its meaning, shape, purpose or function according to various factors such as time, place, motives, and backgrounds; among others. It seems, however, to have deep roots back in the history of mankind. Such a concept stems from a perceived difference with the other. It is fed by the feeling of being hierarchically superior in opposition to another party that is depicted as inferior. Since ancient times, racism is disguised in different forms and manifests itself on various levels. It is a truism that this ideology can be best presented via language.
Due to its negative implication, racism lends itself to a critical kind of research. As such, this paper is a critical pragmatic investigation for this phenomenon a
... Show MoreIn the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show MoreBackground: Suffering from recurrent boils (furunclosis) is a common problem in our locality as it is noticed by many dermatologists especially in association with increasingly hot weather. The most common causative organisms are staphylococci. Objective: The aim of the study was to shed the light upon this problem and compare two systemic therapeutic agents for the prevention of recurrence, doxycycline and rifampicin. Patient and method: One hundred thirty-five (135) Patients with recurrent boils from Al-Yarmouk teaching hospital dermatology outpatient department were included in this study; age ranged from 10 to 64 years old and out of total patients 32 were males and 103 were females. Patients were assessed by full history and cl
... Show MoreThe construction process of reception containing rebuild educated new gloss within the context of real-time knowledge with previous experience and learning environment, accounting for all of the real experiences and information beside Education backbones structural climate (olive 0.2002: p. 212 .) Based on two basic principles - : I: - The natural science that we do know from our experiences, we can not say for sure Bhakaigah realism and clearly, but built by creative minds of certain interpretations be applicable in light of our expectations. Other: - The knowledge built effectively active learner who adapts new knowledge with the conceptual framework has, since everyone has a conceptual framework can break at any time and replaced by a ne
... Show MoreThe present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show MoreThe paper discusses the lack of a uniform definition of politeness due to the constant tension between its universality and language specificity, and argues that some of the theoretical debate could be resolved if the distinction between politeness as a commonsense notion and politeness as a theoretical construct were clearly addressed and acknowledged in the research.
The purpose of the current investigation is to distinguish between working memory ( ) in five patients with vascular dementia ( ), fifteen post-stroke patients with mild cognitive impairment ( ), and fifteen healthy control individuals ( ) based on background electroencephalography (EEG) activity. The elimination of EEG artifacts using wavelet (WT) pre-processing denoising is demonstrated in this study. In the current study, spectral entropy ( ), permutation entropy ( ), and approximation entropy ( ) were all explored. To improve the classification using the k-nearest neighbors ( NN) classifier scheme, a comparative study of using fuzzy neighbourhood preserving analysis with -decomposition ( ) as a dimensionality reduction technique an
... Show MoreBackground: Patients requiring renal biopsies have various glomerular diseases according to their demographic characteristics.
Objective: To study types of glomerular disease among adult Iraqi patients in a single center in Baghdad/Iraq
Material and Methods: A total of 120 native kidney biopsies were studied. All biopsies were adequate and were processed for Light Microscopy.
The age range of the study patients was 17-67 years, with a mean of 38.5 years. The mean follow up period was 28 weeks (4-52 weeks)
Indication for biopsy included: Nephrotic syndrome (N=72; 60%), Asymptomatic proteinuria (N=21; 17.5%), acute nephritic presentation (N=17; 14.16%), asymptomatic haematuria (N=10; 8.33%).
Results: Primary glomerulonephrit
The analytical study of optical bistability is concerned in a fully
optimized laser Fabry-Perot system. The related phenomena of
switching dynamics and optimization procedure are also included.
From the steady state of optical bistability equation can plot the
incident intensity versus the round trip phase shift (φ) for different
values of dark mistuning
12
,
6
,
3
,
1.5
0 , o
or finesse (F= 1, 5, 20,
100). In order to obtain different optical bistable loops. The inputoutput
characteristic for a nonlinear Fabry-Perot etalon of a different
values of finesse (F) and using different initial detuning (φ0) are used
in this rese