Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Nowadays, the use of natural bio-products in pharmaceuticals is gaining popularity as safe alternatives to chemicals and synthetic drugs. Algal products are offering a pure, healthy and sustainable choice for pharmaceutical applications. Algae are photosynthetic microorganisms that can survive in different environmental conditions. Algae have many outstanding properties that make them excellent candidate for use in therapeutics. Algae grow in fresh and marine waters and produce in their cells a wide range of biologically active chemical compounds. These bioactive compounds are offering a great source of highly economic bio-products. The prese
... Show More
A case of angiolymphoid hyperplasia with eosinophilia (ALH) is reported in a 42-year-old woman who developed multiple nodules behind the ear. Angiolymphoid hyperplasia with eosinophilia usually occurs on the head and neck of young adults and is more common in women than in men. Characteristic histologic features of ALH present in this case included proliferation of thick-walled blood vessels lined by prominent endothelial cells, infiltration of the interstitium by chronic inflammatory cells (mainly eosinophils), and presence of lymphoid follicles with germinal centers. The patient referred for surgeon for complete excision. in this context , cases previously described in the literature, and the differential diagnosis of ALH are discussed
... Show MoreSchiff bases (SBs) based on amino acid derivative stand for multipurpose ligands that formed by condensing amino acids with carbonyl groups. They are significant in pharmaceutical and medical areas due to their widespread biological actions such as antiseptic, antifungal, along with antitumor actions. Transition metallic complexes resulting from SB ligands with biological activity were extensively experimented in the literature. In this article, we review, in details, about synthesizing and biological performances of SBs along with its complexes.
Purpose A diagnosis of tuberculosis (TB) of the head and neck has been a dilemma for clinicians, because the clinical and pathologic features tend to mimic different pathologies. Our study aimed to identify the demographic, clinical, and pathologic features of head and neck TB to help healthcare providers in the early detection of the disease. Materials and Methods We performed a retrospective analysis using the medical archives at the pathology laboratory. Twenty-one patients with a clinical and pathologic diagnosis of head and neck TB were identified from 2010 to 2019. Results The age distribution was broad, with 28.5% of the patients younger than 15 years old. Seven patients had oral TB, with the most common sites affected the labial ves
... Show MoreThis article comprehensively examines the history, diagnosis, genetics, diversity, and treatment of SARS-CoV-2. It details the emergence of coronaviruses over the past 50 years, including the coronavirus from 2019 and its subsequent mutations, along with updated information about this virus. This review explains the development and nomenclature of coronaviruses, their cellular invasion through glycoprotein spikes binding to ACE-2 receptors, and the mechanism of cell entry via endocytosis. Diagnosis methods for COVID-19, including nucleic acid amplification, serology, and imaging techniques like chest X-ray and CT scan tests, are discussed. Treatment approaches for COVID-19 are outlined, emphasizing healthcare, antiviral medications like Rem
... Show MoreThe study hypothesize that the majority of Arab countries show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreIn order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T