Preferred Language
Articles
/
khfT15IBVTCNdQwClMHN
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.

Crossref
View Publication
Publication Date
Sat Jan 06 2024
Journal Name
International Journal Of Applied Engineering & Technology
A PROPOSED LIGHTWEIGHT BLOCK CIPHER SYSTEM EMPLOYING DNA CODES
...Show More Authors

Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
Diabetes Mellitus as a Risk Factor for Pulmonary Tuberculosis
...Show More Authors

Background: In the past, an association between Tuberculosis (TB) and Diabetes Mellitus (DM) was widely accepted, today the potential public health and clinical importance of this relationship seems to be largely ignored. The national clinical and policy guidance in the UK on the central of TB, for example, does not consider the relationship with DM.Objectives: To determine the risk of association between diabetes mellitus and pulmonary TB.Methods: A retrospective study conducted in Ibn Zuhr hospital for chest diseases from Jan 2008 – sep 2010 , included in the study 402 patients with TB divided into diabetic & non diabetic, 96 (23.8%) were diabetic while other 306 were TB not diabetic.Results: Risk of TB among DM patients were cle

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
A Survey Study and Comparison of Drones Communication Systems
...Show More Authors

View Publication
Crossref (4)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Toward a stereotype specification for measurement of university women
...Show More Authors

A- The research problem: the research problem which is the garments industry, as a
whole it does not rely on a single system in the sizes of the clothing and the working
companies, see that it is not plausible that the sizes be unificd and consistent in all companies.
The current sizes in the domestic Iraqi markets are not suitable for some females ,on the other
hand the Iraqi industry suffers the lack of a modern standard for some Iraqis female bodies.
B- The Signifiance of the research: lies in the study of the diversity of the human body
sizes and naming them to reflect the desires and requirements of the consumer and try to find
a method to meet their expectations as well as to raise the level of garments industr

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
University Of Baghdad
New Analytical Methods for Drugs Analysis A Comparative Study
...Show More Authors

Four different spectrophotometric methods are used in this study for the determination of Sulfamethoxazole and sulfanilamide drugs in pharmaceutical compounds, synthetic samples, and in their pure forms. The work comprises four chapters which are shown in the following: Chapter One: Includes a brief for Ultraviolet-Visible (UV-VIS) Absorption spectroscopy, antibacterial drugs and sulfonamides with some methods for their determination. The chapter lists two methods for optimization; univariate method and multivariate method. The later includes different types, two of these were mentioned; simplex method and design of experiment method. Chapter Two: Includes reaction of the two studied drugs with sodium nitrite and hydrochloric acid for diazo

... Show More
Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Terrestrial Invertebrates as a Bioindicators of Heavy Metals Pollution
...Show More Authors

Bioaccumulation of heavy metals in the terrestrial invertebrates in Al-Jadriyia district Baghdad- Iraq were investigated. Forth terrestrial invertebrates snails, slug, isopods, and diplopods , were selected for this study. The results showed that all invertebrate groups have the ability in accumulate considerable amounts of heavy metals. Higher levels of zinc and copper were observed in the isopods specimens, it's about ( 60.50±0.58 ) and ( 96.00±0.58 ) ppm respectively , while higher levels of lead were observed in the diplopods specimens ,it's about ( 23.00±1.15 ) ppm ,but the higher levels of both iron and cadmium were observed in snail specimens , it's about ( 590.00±1.15 ) and ( 9.50±1.15 ) ppm respectively .but the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus