In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
This study aimed to identify the role of digital transformation in improving the quality of the internal audit process. The researchers used the descriptive analytical approach, and the questionnaire was relied on as a study tool that was applied to the study population consisting of internal auditors working in banks listed on the Palestine Stock Exchange, and their number was (85). A checker and a comprehensive inventory method was used due to the small size of the community, where the response data of the questionnaire was analyzed and interpreted using the Statistical Packages Program (SPSS).
The results of the study showed that the use of digital transformation contributes to ensuring the quality of
... Show Moreحضيت القيادة باهتمام كبير من قبل الباحثين ودورها الإيجابي في التأثير على الموظفين ونجاح المنظمات، في الآونة الأخير بدأت الدراسات تركز على الجانب المظلم للقيادة وتأثيرها على التابعين وبيئة العمل، وقد تم تحديد القيادة السامة بأنها أخطر الأساليب القيادية التي تتسبب بتكاليف مادية ومعنوية على المنظمات بمختلف جوانبها، ان القيادة السامة تأثر على دوافع المرؤوسين وقدرتهم على انجاز المهام، ورغبتهم في الاستمرار في
... Show MoreThe problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М
... Show MoreInvestment Bases directly and closely to an environment characterized by political, social and economic stability, and through a range of policies and institutions and economic laws that affect investor confidence and convince him directing investments to country without the other, where inter conditions and circumstances affecting the trends of capital and settle in, and political situation of the country and what is characterized of stability or disorder as well as economic conditions that are affected by what is distinguishes the country from geographic and demographic characteristics are reflected on availability of production elements and country's infrastructure.
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe World witnessed over the past few decades a clear change in the urban existence map, where the number of cities' residents has increased and the cities geographic area expanded, also networks of roads and electric power stations were spread. This extraordinary events caused the drawing of a different identity to the world, race with itself in the field of energy and raw materials consumption. Therefore, the research issue individualizes in the lack of available knowledge concerning the subject of environment friendly ecological urban desiging and planning.So the research aims to define the environmentally friendly eco-city' structural elements and to clarify their most important planning and design foundations. To In
... Show More