Preferred Language
Articles
/
khfT15IBVTCNdQwClMHN
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.

Crossref
View Publication
Publication Date
Tue Feb 21 2023
Journal Name
Journal Of Risk And Financial Management
A Multidimensional View of Intellectual Capital and Dynamic Innovative Performance
...Show More Authors

A review of the literature on intellectual capital development was conducted using systemic criteria for the inclusion of relevant studies. The concepts behind the ideas explored in the present study were discussed in respect to the subject matter. Examining the past state of the art in the intellectual capital sector for achieving high levels of innovation performance provided a multidimensional picture of intellectual capital, innovation performance, and dynamic capabilities. The present review was designed to illustrate the correlation between intellectual capital and innovation performance, as well as the role of dynamic capabilities in moderating the relationship between these constructs. Accordingly, we presented an extensive

... Show More
View Publication
Scopus (46)
Crossref (34)
Scopus Crossref
Publication Date
Fri Sep 29 2017
Journal Name
Journal Of Nursing Scholarship
A Multicountry Perspective on Cultural Competence Among Baccalaureate Nursing Students
...Show More Authors
Abstract<sec><title>Purpose

To assess cultural competence among nursing students from nine countries to provide an international perspective on cultural competence.

Design

A descriptive, cross‐sectional design.

Methods

A convenience sample of 2,163 nursing students from nine countries was surveyed using the Cultural Capacity Scale from April to November 2016.

Results

The study found a moderate range of cultural competence among the students. The ability to teach and guide other nursing colleagues to displ

... Show More
View Publication
Scopus (45)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Sat Aug 31 2024
Journal Name
International Review On Modelling And Simulations (iremos)
Prosthetic Hand: a Brief Survey of Design and Actuation Technologies
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jun 25 2024
Journal Name
Biomedical And Pharmacology Journal
Psidium guajava: A Review on Its Pharmacological and Phytochemical Constituents
...Show More Authors

Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl

... Show More
View Publication
Scopus (16)
Crossref (16)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Characterization of Etodolac as a Topical Nanosponges Hydrogel
...Show More Authors

Nanosponges (NS) of etodolac(ETO) was prepared using the emulsion solvent diffusion method ; the effects of drug: polymer ratio, the effect of level concentration of internal phase and stirring time and other variables that effect on the physical characteristics of NS were investigated and characterized, The selected formula was lyophilized then incorporated into hydrogel ; which also evaluated .The results show that the formulation that contain Drug: PVA:EC in ratio 1:3:2 is the best with smallest particle size 40.2±0.098 with polydispersibility0.005 and in vitro release 97.6±0.11%, , ETO NS Carbopol hydrogel produced a significant(p<0.05) improvement of the in vitro release than pure ETO hydrogel.

View Publication Preview PDF
Scopus (22)
Crossref (12)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Japanese Dental Science Review
Pathogenesis of periodontitis – A potential role for epithelial-mesenchymal transition
...Show More Authors

Epithelial mesenchymal transition (EMT) is a process comprising cellular and molecular events which result in cells shifting from an epithelial to a mesenchymal phenotype. Periodontitis is a destructive chronic disease of the periodontium initiated in response to a dysbiotic microbiome, and dominated by Gram-negative bacteria in the subgingival niches accompanied by an aberrant immune response in susceptible subjects. Both EMT and periodontitis share common risk factors and drivers, including Gram-negative bacteria, excess inflammatory cytokine production, smoking, oxidative stress and diabetes mellitus. In addition, periodontitis is characterized by down-regulation of key epithelial markers such as E-cadherin together with up-regulation of

... Show More
Preview PDF
Scopus (48)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (17)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Design of an Optimal Integral Backstepping Controller for a Quadcopter
...Show More Authors

In this paper, an Integral Backstepping Controller (IBC) is designed and optimized for full control, of rotational and translational dynamics, of an unmanned Quadcopter (QC). Before designing the controller, a mathematical model for the QC is developed in a form appropriate for the IBC design. Due to the underactuated property of the QC, it is possible to control the QC Cartesian positions (X, Y, and Z) and the yaw angle through ordering the desired values for them. As for the pitch and roll angles, they are generated by the position controllers. Backstepping Controller (BC) is a practical nonlinear control scheme based on Lyapunov design approach, which can, therefore, guarantee the convergence of the position tracking

... Show More
View Publication Preview PDF
Crossref (11)
Crossref