Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.
The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia
... Show MoreThis research aims to learn about public relations programs and their role to enhance the morale of the State land Transport Company employees.The researcher relied on the survey method and use a questionnaire and scale tools to collect information from workers in the Department of Relations and Media and employees in all departments.
The research reached several conclusions, including:
1- Public relations seek to increase workers’ confidence in senior management and motivate them to improve their production, as well as their relentless endeavor to bring workers closer by following multiple and varied forms of communication with them.
2- The results of the study showed that there was a negative i
The research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in
Introduction and Aim: Diabetes mellitus patients almost always struggle with a metabolic condition known as chronic hyperglycemia. According to the World Health Organization, osteoporosis is a progressive systemic skeletal disorder that is characterized by decreasing bone mass and microstructural breakdown of bone tissue that increases susceptibility to fracture and increased risk of breaking a bone. Here, we aimed to compare the levels of CatK and total oxidative state in patients with diabetes and osteoporosis among the female Iraqi population and study the possible relationship between them. Materials and Methods: This study included 40 females with diabetes (Group G1), 40 with diabetes and osteoporosis (Group G2) and 40 normal healthy f
... Show MoreBig data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide
... Show MoreToday, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o
... Show MoreFind cares studying the aesthetics of environmental art, one of the topics that is one of the problems of the aesthetic side in the arts of postmodernism, so this research came as an attempt to get to know the aesthetic concepts of environmental art that can be learned from functional testing in the formation of the post-modern control. The research involved four chapters: The first chapter discusses the general framework of the research methodology, as it was displayed in itThe research problem and its importance and define its objective to identify the aesthetics of environmental art at the level of the body, meaning, the receiver .ozlk in Iraq and America as the spatial limits of the time limits are period stretching from 1970 to 2006
... Show MoreIraq is located near the northern tip of the Arabian plate, which is advancing northwards relative to the Eurasian plate, and is predictably, a tectonically active country. Seismic activity in Iraq increased significantly during the last decade. So structural and geotechnical engineers have been giving increasing attention to the design of buildings for earthquake resistance. Dynamic properties play a vital role in the design of structures subjected to seismic load. The main objective of this study is to prepare a data base for the dynamic properties of different soils in seismic active zones in Iraq using the results of cross hole and down hole tests. From the data base collected it has been observed that the average ve
... Show MoreThis study was aimed to explore the impact of social concepts about tribe, clan and women, on internal audit performance. These concepts are considered to be components of the organizational culture and performance of internal audit practice, with respect to the individual and collective performance within the institution. The study, furthermore, was intended to investigate and understand the role of the organizational culture of the tribal, clan and women components with regard to their role in society, in Qatar.
To achieve these objectives, the researcher followed the descriptive analytical approach, using a questionnaire directed to experts and staff working in the banking sector, with the view to test
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More