Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Among the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the
... Show MoreIn this work, the Whittaker wave functions were used to study the nuclear density distributions and elastic electron scattering charge form factors for proton-rich nuclei and their corresponding stable nuclei (10,8B, 13,9C, 14,12N and 19,17F). The parameters of Whittaker’s basis were fixed to generate the experimental values of available size radii. The Whittaker basis was connected to harmonic-oscillator basis through boundary condition at match point. The nuclear shell model was opted with pure configuration for all studied nuclei to compute aforementioned studied quantities except 10
This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1) is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to
... Show MoreThe environment and the placesthat prince Faisal Bin AL-Husein influenced his childhood ,
behaviourand future . his expereence in his early life in leading the battles and
arabRevoluionenriched him . inspite of his short periedand harsh experience of leadersmp.
he gained an experienencein ruling iraqadter 1921 . The Syrian experiencetaught him how to
deal with the strong and establish the government as he beliered in the slogan: independence
is taken not given. He established the consititution and the election . he made a solid
basefeconomy of in his time, Iraq , Iraq be came the country number ( 53) as an
independency country on the third of November 1932 . he died peacefuliy after Iraq's
indepence.
Abstract search seeks to clarify the role and the importance of financial and fiscal policy adopted by the Iraqi Government during the years (2015 – 2018) to meet federal public deficit, as the Iraqi economy to shocks from falling global oil prices and terrorist attack ISIS, so the State budget suffered from a severe lack of income as a result of its reliance on revenues from selling crude oil and in return the high proportion of public expenditures. Especially military to counter these attacks that by studying the results of the implementation of budgets and analysis and statement Causes of disabilities and assessment of these policies and procedures imposed by the International Monetary Fund. the research aims to show how increased g
... Show MoreThirty local fungal isolates according to Aspergillus niger were screened for Inulinase production on synthetic solid medium depending on inulin hydrolysis appear as clear zone around fungal colony. Semi-quantitative screening was performed to select the most efficient isolate for inulinase production. the most efficient isolate was AN20. The optimum condition for enzyme production from A. niger isolate was determined by busing a medium composed of sugar cane moisten with corn steep liquor 5;5 (v/w) at initial pH 5.0 for 96 hours at 30 0C . Enzyme productivity was tested for each of the yeast Kluyveromyces marxianus, the fungus A. niger AN20 and for a mixed culture of A. niger and K. marxianus. The productivity of A. niger gave the highest
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.