In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
The study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course
... Show MoreAbstract
Binary logistic regression model used in data classification and it is the strongest most flexible tool in study cases variable response binary when compared to linear regression. In this research, some classic methods were used to estimate parameters binary logistic regression model, included the maximum likelihood method, minimum chi-square method, weighted least squares, with bayes estimation , to choose the best method of estimation by default values to estimate parameters according two different models of general linear regression models ,and different s
... Show MoreAbstract:
Background: Retinol binding protein 4 (RBP4), an adipokine that participate in a lipid metabolism or insulin resistance through a complex regulatory network. Recently, RBP4 was reported to be associated with many cardiovascular diseases (CVDs) risk factors in patients of type 2 diabetes mellitus (T2DM). This study aims to study the correlation of serum RBP4 with some markers of glycemic control, dyslipidemia, hypertension and obesity in T2DM Iraqi patients.
Subjects and Methods: one hundred fifty participants were enrolled in this coss-sectional study, 120 of participants were T2DM patients and 30 were apparently healthy individuals to serve as control gro
... Show MoreThe interest in Multi social skills and self-concept is extremely important for many of the scholars of education and psychology has taken a great deal in their writings and their interests as they see that social skills training is to make sure of the same, and that whenever enable the individual from acquiring social skills whenever asserted itself.The research aims know social skills and self-concept and their relationship to the children Riyadh age (4-6 years), and the research sample consisted of(200) boys and girls from kindergarten in the city of Baghdad Bjanbey Rusafa second and Karkh second.And to the objectives of the research realized the researcher has built two measures of social skills a
... Show MoreThe study seeks the relationship between the mathematical-procedural Knowledge and the logical-mathematical intelligence among students at the third stage in mathematics department. To this end, three questions were arisen: what is the level of mathematical-procedural Knowledge among the third stage students in mathematics department regarding their gender? Do male or female students have more logical-mathematical intelligence and are there significant differences base on their gender? What kind of correlation is between the level of mathematical-procedural Knowledge and the logical-mathematical intelligence of male and female students in the third stage in the mathematics department? A sample of (75) male and female students at the thir
... Show MoreThe objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high
... Show MoreAbstract
The aim of this research is to determine how well the Cubing Technique affects the Iraqi EFL students' composition writing, vocabulary, and meta-cognitive awareness of writing strategies. The sample of (64) secondary-school female students in the fifth grade is drawn from two classrooms and split into two equal groups: the experimental group and the control group, each of which consists of (32) students. A quasi-experimental design is applied. The performance test and Meta-cognitive Writing Strategies questionnaire are given as a pre-test for equalizing the two groups after ensuring their validity and reliability. Then, they are administrated as a posttest in both groups. According to the results, the si
... Show More