Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many applications, and tools that can be used for providing the integrity and security to the data located in the cloud environment.
Low back pain a major causes of morbidity throughout the world and it is a most debilitating condition ,and can lead to decreased physical function ,compromised quality of life, and psychological distress. Obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific LBP. However, the relationship between obesity and LBP remain to date unsupported by objective measurements of mechanical behavior of spine and it is morphology in obese subjects. Key words: obesity, low back pain,
Language mirrors understanding of the same or other culture. Meaning is hardly encoded in the world community. Some linguists cannot solve language problems because of its abstractedness. Language communicators learn the second or foreign language at schools for three reasons. First, English is not their first language. Second, they have little or no educational background in experiencing what they know in another language. Third, they have not improved their communication skills in English. Analyzing the language as a mean of communication would not be learned enough without its practice. This paper gives an exclusive preview of applied linguistics. It defines the conversion of different areas of the study of language with second o
... Show MoreThis paper aims to give an overview of acculturation in the literature by means of its explicit definitions, main characteristics, and categorical process. It also foreshadows the significance of acquiring novice culture with particular connection to second language acquisition. Schumann and John Berry underscored acculturation each with its own model of acculturation. In the case of this review, you will realize that Schumann's two main aspects are firmly rooted in berry's model of acculturation as an exclusive description in relation to second language acquisition. Steven Krashen outlined acquiring language from the intellectual and linguistic view of learning, whereas Micheal Long demanded for communication in social perspective. It has
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreThis paper deals with social responsibility visible to the media and the role they play in spreading the culture of environmental protection, and make research on a sample of the University of Baghdad consisting students from 150 students, male and female were distributed questionnaire form on the sample to obtain the required information has been questionnaire included axes distributed questions achieve the objectives of the search, and after the form data were analyzed using statistical program spss results show that the visual media and its role in spreading the culture of environmental protection form averages arithmetic high, indicating a rise in the influence of th
... Show MoreCD40 is a type 1 transmembrane protein composed of 277 amino acids, and it belongs to the tumor necrosis factor receptor (TNFR) superfamily. It is expressed in a variety of cell types, including normal B cells, macrophages, dendritic cells, and endothelial cells, as a costimulatory molecule. This study aims to summarize the CD40 polymorphism effect and its susceptibility to immune-related disorders. The CD40 gene polymorphisms showed a significant association with different immune-related disorders and act as a risk factor for increased susceptibility to these diseases.
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreResearchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped