Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.
We compare two methods Bayesian and . Then the results were compared using MSe criteria.
A simulation had been used to study the empirical behavior for the Logistic model , with different sample sizes and variances. The results using represent that the Bayesian method is better than the at small samples sizes.
... Show MoreThe electrocardiogram (ECG) is the recording of the electrical potential of the heart versus time. The analysis of ECG signals has been widely used in cardiac pathology to detect heart disease. The ECGs are non-stationary signals which are often contaminated by different types of noises from different sources. In this study, simulated noise models were proposed for the power-line interference (PLI), electromyogram (EMG) noise, base line wander (BW), white Gaussian noise (WGN) and composite noise. For suppressing noises and extracting the efficient morphology of an ECG signal, various processing techniques have been recently proposed. In this paper, wavelet transform (WT) is performed for noisy ECG signals. The graphical user interface (GUI)
... Show MoreNowadays, energy demand continuously rises while energy stocks are dwindling. Using current resources more effectively is crucial for the world. A wide method to effectively utilize energy is to generate electricity using thermal gas turbines (GT). One of the most important problems that gas turbines suffer from is high ambient air temperature especially in summer. The current paper details the effects of ambient conditions on the performance of a gas turbine through energy audits taking into account the influence of ambient conditions on the specific heat capacity ( , isentropic exponent ( ) as well as the gas constant of air . A computer program was developed to examine the operation of a power plant at various ambient temperature
... Show MoreIn this research tri metal oxides were fabricated by simple chemical spray pyrolysis technique from (Sn(NO3)2.20 H2O, Zn(NO3)2.6 H2O, Cd(NO3)2.4 H2O) salts at concentration 0.1M with mixing weight ratio 50:50 were fabricated on silicon substrate n-type (111). (with & without the presence of grooves by the following diemensions (20μm width, 7.5μm depth) with thickness was about ( 0.1 ±0.05 µm) using water soluble as precursors at a substrate temperature 550 ºC±5, with spray distance (15 cm) and their gas sensing properties toward H2S gas at different concentrations (10,50,100,500 ppmv) in air were investigated at room te
... Show MoreHeat pipes and two‐phase thermosyphon systems are passive heat transfer systems that employ a two‐phase cycle of a working fluid within a completely sealed system. Consequently, heat exchangers based on heat pipes have low thermal resistance and high effective thermal conductivity, which can reach up to the order of (105 W/(m K)). In energy recovery systems where the two streams should be unmixed, such as airconditioning systems of biological laboratories and operating rooms in hospitals, heat pipe heat exchangers (HPHEs) are recommended. In this study, an experimental and theoretical study was carried out on the thermal performance of an air‐to‐air HPHE filled with two refrigerants as working fluids, R22 and R407c. The heat pipe he
... Show MoreThe efficient removal of dissolved organic compounds (DOC) from wastewater has become a major environmental concern because of its high toxicity even at low concentrations. Therefore, a technique was needed to reduce these pollutants. Ion exchange technology (IE) was used with AmberliteTM IR120 Na, AmberliteTM IR96RF, and AmberliteTM IR402, firstly by using anion and mixed bed system, where the following variables are investigated for the process of adsorption: The height of the bed in column (8,10 and 14 cm), different concentrations of (DOC) content at constant flow rate. The use of an ion exchanger unit (continuous system) with three columns (cation, anion, and mixed bed) was studied.
... Show MoreThis work is concerned with a two stages four beds adsorption chiller utilizing activated carbon-methanol adsorption pair that operates on six separated processes. The four beds that act as thermal compressors are powered by a low grade thermal energy in the form of hot water at a temperature range of 65 to 83 °C. As well as, the water pumps and control cycle consume insignificant electrical power. This adsorption chiller consists of three water cycles. The first water cycle is the driven hot water cycle. The second cycle is the cold water cycle to cool the carbon, which adsorbs the methanol. Finally, the chilled water cycle that is used to overcome the building load. The theoretical results showed that average cycle cooling power
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More