Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
The current research deals with the subject of spatial transformations and visual construction in contemporary theater. How the visual system works to create spatial diversity in the contemporary Iraqi theater performance and how visual construction contributes to a spatial development process capable of building a tourism system that creates an architectural architecture that leaves the topography of the scriptural architecture. And the production of various indications and patterns in the scene of theatrical presentation in order to produce the new foundational meaning by creating a new structure that leads to diversity and diversity in the visual system and the beginning of visual constructions and their applications. Knowledge and te
... Show MoreSecurity reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreDigital literacy is crucial in the modern workforce, where technology plays an integral role in daily operations. This abstract explores the significance of digital literacy in enhancing productivity, efficiency, and competitiveness in the workplace. Digital literacy encompasses the ability to use and navigate digital tools and platforms effectively, including software, applications, and online communication tools. In today's digital age, employers increasingly value candidates with strong digital skills, as they are better equipped to adapt to rapidly evolving technologies. This abstract highlights the importance of digital literacy in empowering employees to perform tasks more efficiently, collaborate seamlessly, and innovate effecti
... Show MoreAt the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show Moreيشكل السياق جانبا مهماً في فهم الخطاب والمقصود هنا العرض المسرحي، من خلال ما يمده السياق للمتلقي من مؤشرات، يتم الاعتماد عليها في استكمال المعنى الظاهر بالمعنى المستتر، فالسياق يعتمد في الاصل على المحيط المادي الاجتماعي الذي يتم فيه التواصل وفيه يتعرف المرسل والمتلقي أحدهما على الآخر وتتبلور الصورة التي يحملها الطرفان أحدهما عن الآخر، الى جانب كونه يمثل الاحداث التي سبق لهما أن عاشاها والتبادل القولي
... Show MoreThe acceptance sampling plans for generalized exponential distribution, when life time experiment is truncated at a pre-determined time are provided in this article. The two parameters (α, λ), (Scale parameters and Shape parameters) are estimated by LSE, WLSE and the Best Estimator’s for various samples sizes are used to find the ratio of true mean time to a pre-determined, and are used to find the smallest possible sample size required to ensure the producer’s risks, with a pre-fixed probability (1 - P*). The result of estimations and of sampling plans is provided in tables.
Key words: Generalized Exponential Distribution, Acceptance Sampling Plan, and Consumer’s and Producer Risks
... Show More
Abu Al-Ala Al-Ma’arri is a linguist and writer who showed his prowess in poetry, so he had poetry collections, including “The ulna fell,” which is one of the books that attracted the attention of scholars such as (Tabrizi, Al-Khwarizmi, Al-Bateliusi and Al-Zamakhshari) .
To explain his language in it, the investigators’ hands finally revealed an explanation of this book, which was the work of Abu Al-Ala Al-Ma’arri himself. Those who studied the Divan (The Zind) and its explanations or the character and language of Al-Ma’arri did not pay any attention to it. Therefore, I made this research a continuation of those efforts, using semantic research as a means of revealing Al-Maarri's ef
... Show MoreThe Life Cycle and Larval Development of Neoechinorhynchus iraqensis (Acanthocephala: Neoechinorhynchidae) in the Intermediate Host
Knowledge management contribute to the overall private university libraries to develop libraries for the purpose of creating human and technological resources by investing research and development, as well as education and training for life.
This study followed the methodology of the descriptive and historical pillars of knowledge management for the years 1990 to the present day in 2017, depending on statistical figures obtained by the researchers from the General Secretariat of the Central Library at the University of Baghdad, and the Human Resources Division, which specialized human resources training after 2004 (and before those years from 1982 until 2002, where the continuing education was committee of the fixed committees are wor