In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
Background: A carefully planned clinical medical education is critical for the provision of supportive clinical educational environment. The latter will ensure effective teaching, active learning and good attitudes and performance at the bedside. The aim of this study was to evaluate clinical learning environment at AL-Diwaniyah Teaching Hospital. Materials and Methods: A descripitive cross-sectional study involved resident doctors from Internal Medicine and Surgery departments who had six months or more residency training in the respective departments. Data were collected using the Postgraduate Hospital Educational Environment Measure. Data where analyzed using the Statistical Package for Social Sciences version 21.0 and presented us
... Show MoreObjectives: To evaluate the families’ attitudes toward environment pollution, and determine the relationship
between families’ attitudes towards environment pollution and their demographic characteristics of age,
education, type of family, and socioeconomic status.
Methodology: A descriptive design is carried throughout the present study to evaluate families’ attitudes toward
environment pollution for the period of October 5th2013 to May 7th2014. A non-probability "purposive" sample of
(110) families’ is selected. The sample is comprised of two groups; (75) urban families’ and (35) rural ones. An
evaluation tool is designed and constructed for the purpose of the study. It is consisted of (4) main parts;
dem
Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronicall
... Show MoreAbstract:
The hotel sector is one of the most vital sectors exposed to risks, and the authorities concerned with control must take their active and influential role in putting the hotel sector on the right track and compatible with the internationally approved approaches, and the importance of auditing the performance of the hotel sector in light of the (Covid-19) pandemic is embodied in the fact that it gives a clear and realistic picture to the management and regulatory bodies about the performance and activities of this sector and the shortcomings and deviations that must be addressed, and also helps government decision makers to ob
... Show MoreTwitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show MoreUnconfined compressive strength (UCS) of rock is the most critical geomechanical property widely used as input parameters for designing fractures, analyzing wellbore stability, drilling programming and carrying out various petroleum engineering projects. The USC regulates rock deformation by measuring its strength and load-bearing capacity. The determination of UCS in the laboratory is a time-consuming and costly process. The current study aims to develop empirical equations to predict UCS using regression analysis by JMP software for the Khasib Formation in the Buzurgan oil fields, in southeastern Iraq using well-log data. The proposed equation accuracy was tested using the coefficient of determination (R²), the average absolute
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show More