In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
The research aims to identify the extent to which Iraqi private banks practice profit management motivated by reducing the taxable base by increasing the provision for loan losses by relying on the LLP it model, which consists of a main independent variable (net profit before tax) and independent sub-variables (bank size, total debts to total equity, loans granted to total obligations) under the name of the variables governing the banking business. (Colmgrove-Smirnov) was used to test the normal distribution of data for all banks during the period 2017-2020, and then find the correlation between the main independent variable sub and the dependent variable by means of the correlation coefficient person, and then using the multiple
... Show MoreMorphologies of ceramic hollow fiber membranes prepared by a combined phase-inversion and sintering method were studied. The organic binder spinning solution containing suspended Al₂O₃ powders was spun to a hollow fiber precursor, which was then sintered at elevated temperatures( 300 ˚C, 1400 ˚C, 25 ˚C) in order to obtain the Al₂O₃ hollow fiber membranes. The spinning solution consisted of polyether sulfone (PES), N-methyl-2-pyrrolidone (NMP), which were used as polymer binder, solvent, respectively. The prepared Al₂O₃ hollow fiber membranes were characterized by a scanning electron microscope (SEM). It is believed that finger-like void formation in asymmetric ceramic membranes is initiated by hydrodynamically unstable vis
... Show MorePhenol condensed with β-keto esters via Pechmann condensation to form derivatives of Coumarin in various reaction conditions by two ways. Present paper is comparative study of synthesis Coumarin with the yield of product , reaction time and reaction conditions.
BACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity tr
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreA retrospective study is conducted to identify factors that improve prospective animal studies; contribute to the optimization of animal protection from all unnecessary and preventable damage. Preclinical oral histology research from 2010-2020 is evaluated and 64 studies were reviewed relating to two interventions: bone trauma and surgical incision. The harm-benefit analysis is featured in this study through the application of the recent form of Bateson's Cube. Depending on its three axes, we can assess animal suffering, the likelihood of benefit, and the importance of research. The total number of animals used in the research is 2685. Rats, 51.6%, and rabbits, 48.4%, are the most commonly used animals. Research related to bone healing acco
... Show More