Saturday, December 28, 2019

Levy Patrick Mwanawasa - President of Zambia 2002-2008

Born: 3 September 1948 - Mufulira, Northern Rhodesia (now Zambia)Died: 19 August 2008 - Paris, France Early LifeLevy Patrick Mwanawasa was born in Mufulira, in Zambias Copperbelt region, part of the small ethnic group, the Lenje. He was educated at Chilwa Secondary School, in Ndola district, and went to read law at University of Zambia (Lusaka) in 1970. He graduated with a Bachelor of Law degree in 1973. Mwanawasa started his career as an assistant in law firm in Ndola in 1974, he qualified for the bar in 1975, and formed his own law company, Mwanawasa and Co., in 1978. In 1982 he was appointed Vice-chairman of Law Association of Zambia and between 1985 and 86 was the Zambian Solicitor-General. In 1989 he successfully defended former vice-president Lieutenant General Christon Tembo and others charged with plotting a coup against then president Kenneth Kaunda. Start of a Political CareerWhen Zambian president Kenneth Kaunda (United National Independence Party, UNIP) approved creation of opposition parties in December 1990, Levey Mwanawasa joined the newly created Movement for Multiparty Democracy (MMD) under the leadership of Fredrick Chiluba. Presidential elections in October 1991 were won by Frederick Chiluba who took office (as Zambias second president) on 2 November 1991. Mwanawasa became a member of National Assembly for Ndola constituency and was appointed vice president and leader of the Assembly by President Chiluba. Mwanawasa was seriously injured in a car accident in South Africa in December 1991 (his aide died at the site) and was hospitalized for an extended period. He developed a speech impediment as a result. Disillusioned with Chilubas GovernmentIn 1994 Mwanawasa resigned as vice president claming the post was increasingly irrelevant (because he was repeatedly sidelined by chiluba) and that his integrity had been put in doubt after an argument with Micheal Sata, minister without portfolio (effectively the cabinet enforcer) in the MMD government. Sata would later challenge Mwanawasa for the presidency. Mwanawasa publicly accused Chilubas government of endemic corruption and economic irresponsibility, and left to devot his time to his old legal practice. In 1996 Levy Mwanawasa stood against Chiluba for the leadership of the MMD but was comprehensively defeated. But his political aspirations were not finished. When Chilubas attempt to change Zambias constitution to allow hi a third term in office failed, Mwanawasa moved to the forefront once again - he was adopted by the MMDs as their candidate for president. President MwanawasaMwanawasa achieved only a narrow victory in the December 2001 election, although his poll result of 28.69% votes cast was sufficient to win him the presidency on a first-past-the-post system. His nearest rival, out of ten other candidates, Anderson Mazoka received 26.76%. Election result was challenged by his opponents (especially by Mazokas party who claimed they had in fact won). Mwanawasa was sworn into office on 2 January 2002. Mwanawasa and the MMD lacked an overall majority in the National Assembly - due to voter distrust of a party Chiluba had brought into disrepute, from Chilubas attempt to hold on to power, and because Mwanawasa was seen as a Chiluba puppet (Chiluba retained the post of MMD party president). But Mwanawasa moved quickly to distance himself from Chiluba, starting an intensive campaign against the corruption which had plagued the MMD. (Mwanawasa also abolished the Ministry of Defense and took over the portfolio personally, retiring 10 senior military officers in the process.) Chiluba gave up presidency of the MMD in March 2002, and under Mwanawasas guidance the National Assembly voted to remove the former presidents immunity to prosecution (he was arrested in February 2003). Mwanawasa defeated a similar attempt to impeach him in August 2003. Ill HealthConcerns over Mwanawasas health arose after he suffered a stroke in April 2006, but he recovered enough to stand once again in presidential elections -- winning with 43% of the vote. His nearest competitor, Michael Sata of the Patriotic Front (PF) received 29% of the vote. Sata typically claimed voting irregularities. Mwanawasa suffered an second stroke in October 2006. On 29 June 2008, hours before the start of an African Union summit, Mwanawasa had a third stroke -- reportedly much more severe than the previous two. He was flown to France for treatment. Rumors of his death soon circulated, but were dismissed by the government. Rupiah Banda (member of the United National Independence Pary, UNIP), who had been vice-president during Mwanawasas second term, became acting president on 29 June 2008. On 19 August 2008, in hospital in Paris, Levy Patrick Mwanawasa died of complications due to his earlier stroke. He will be remembered as a political reformist, who secured debt relief and led Zambia through a period of economic growth (partly bolstered by the international rise in the price of copper).

Friday, December 20, 2019

Mean Girls And Developmental Psychology Essay - 1808 Words

MEAN GIRLS AND DEVELOPEMTAL PSYCHOLOGY Chinonyerem Onuoha Texas Women’s University Mean Girls and Developmental Psychology Introduction The film that I chose to do was the movie Mean Girls. This movie is filled with many funny characters and an amusing plot, but even though this movie has earned the crown of being the official â€Å"chick flick† it has a lot of psychological concepts that people really do not realize. However, when you really think about it, the movie has a lot to relate with when it comes to teenagers going into a new school because every teen that enters high school goes though the emotional and social stages of development. In this paper we will be looking at parts of the movie that focus on Cady and her stages of development as she goes through high school and deals with the Plastics, and then the Plastics themselves as well as certain aspects and things that revolve around them throughout the movie. Mean Girls is about a young teen girl Cady Heron who just moved from Africa to attend a public high school in America for the first time. This is very different for Cady because the high school setting in America will be extremely different from how it was when she was living in Africa. It’s not easy for her because she is not used to the American customs or â€Å"norms†. Within the first couple of days of school she becomes really good friends with two people named Janis and Damien. In the school there are many many cliques, and JanisShow MoreRelatedAutism Spectrum Disorder And Developmental Psychology Essay1536 Words   |  7 PagesAutism Spectrum Disorder and Developmental Psychology Developmental psychology is a scientific approach that focuses on the ways in which individuals change and evolve across their lifespan, beginning with birth and ending in death. This specific study of the mind and behavior tends to concentrate on the time period from birth to adolescence because this is when the majority of development occurs. This branch of psychology revolves around various types of changes, including behavioral, culturalRead MoreGender Inequality And Its Impact On Children s Developmental Essay1396 Words   |  6 Pageschildren learn what is means to be a boy or girl from societal standards. Children begin to suffer from the boys versus girl’s mentality which is evident in the social behavior of children. Children’s stereotypical thinking about gender is manifested through their acceptance of gender roles. In the blog, Beyond Pink and Blue: Raising children with science instead of stereotypes, Christia Spears Brown, Ph.D. discuss issues of gender labeling and its impact on children’s developmental. Her objective isRead MoreThe Psychology of Mean Girls 1339 Words   |  5 PagesThe Psychology of Mean Girls Mean Girls, ironically my favorite movie, in my opinion clearly and comically depicts the misconceptions and stereotypes that are perceived by society of early adolescents. Stanley Hall characterized adolescence as a time of â€Å"storm and stress† and this negative image has stuck with society. As we’ve learned and discussed in class, Sigmund Freud took the concept of storm and stress a step further and developed his stages of psychosocial development but saw adolescenceRead MoreI Graduate From Concordia University Essay1461 Words   |  6 PagesAs I graduate from Concordia University with a double major in psychology and behavioral science, I have many career and educational paths to pursue. One career goal in the forefront of my mind is a clinical psychologist. I have an interest in this career field because I have a strong interest in the diagnosis and treatment of severe mental illness. In order to be able to do such things in my future, further education is n eeded. Thus, postgraduate education is a strong interest of mine. UniversityRead MoreEssay about Compare and Contrast Two Theories of Gender Role Development1379 Words   |  6 Pagesor physical appearance. In this theory gender is more seen as a state and various different factors. Evidence for Kohlberg‘s theory is found in Piagets developmental theory. The understanding of consistency in gender is predicted at around the same age as in which Piaget suggested that children start to appreciate conservation, which means that an object and in this case a human being, still remains the same even when it‘s appearance changes. Furthermore, Slaby and Frey conducted a researchRead MoreLifespan Development : Cognitive, And Personal And Social Development1717 Words   |  7 PagesLifespan Psychology Introduction Lifespan Development is the field of study that examines patterns, modes of growth, change, and stability in behavior that occur throughout the entire lifespan of an individual. There are so many things to keep in mind about Lifespan Psychology; 1. Lifespan Psychology is a scientific, developmental approach that focuses on human development. 2. Scientists who study the lifespan know that neither heredity nor environment alone can account for the full range of humanRead MoreEssay about Developmental Psychology Journal Articles827 Words   |  4 PagesDevelopmental Psychology Journal Articles The five journal articles I examined were all from a journal titled Developmental Psychology, May 2000. The first journal article that I observed was Sleep Patterns and Sleep Disruptions in School-Aged Children. This study assessed the sleep patterns, sleep disruptions, and sleepiness of school-age children. Sleep patterns of 140 children (72 boys and 68 girls; 2nd-, 4th-, and 6th-grade students) were evaluated with activity monitors (actigraphs)Read MoreGrowth And Development Of Personality Psychology1208 Words   |  5 PagesCorissa Beairsto Personality Psychology 321 09/1/2014 Growth and Development in Personality Psychology With the growing research in Psychology, we find the question, â€Å"how did we get this way,† more common in development across the lifespan. (Cervone Parvin, 2013) Personality theorists are looking more at this question, pushing to understand personality development even more. Two main challenges are faced while studying personality development; the patterns of development consistent with what mostRead MoreArticle Review: Prior Experience and Perceived Efficacy Influence 3-Year-Olds Imitation1553 Words   |  7 Pageshypothesis before the study began was that prior experience would be an important factor in determining whether a child would adopt the means used by a model in the performance of a task. If their own means achieved the desired goal, they would be less likely to adopt the precise means used by the model. If they were unable to perform the goal through their own means, or had a difficult time, they would be more apt to imitate someone elses successful attempt. The study was performed in a laboratoryRead MoreAutism And Its Effects On Children1205 Words   |  5 PagesWhat is Autism? Autism also specified as Autistic Spectrum Disorder, ASD, Pervasive Developmental Disorder (PDD), Childhood Autism (ICD-10), Autistic Disorder (DSM-IV), Atypical Autism (ICD-10), PDD not otherwise specified (PDD-NOS), Asperger Syndrome†¨(ICD- 10)/Asperger Disorder (DSM-IV), is a series of developmental disabilities that cause substantial impairments in social interaction, as well as difficulties in nonverbal interactions and behavioral challenges. From the early 1900s, autism has been

Thursday, December 12, 2019

Vegetarianism Essay Research Paper Cigarette SmokingFor a free essay sample

Vegetarianism Essay, Research Paper Cigarette Smoking For a long clip now many people have different positions about smoke in public topographic points. Smokers feel it is their right to smoke where and when they privation. On the other manus non-smokers feel tobacco users violate their rights and endanger there life. Smoking causes bosom disease, lung malignant neoplastic disease and other serious unwellnesss. Cigarette smoke is the figure one cause of lung malignant neoplastic disease. A significant figure of lung malignant neoplastic diseases that occur in non-smokers can be attributed to nonvoluntary smoke. There are some parts in the United States where you can smoke in public topographic points, on the other manus in New York there are designated countries. While some people feel that smoking in public topographic points should stay since it is their right, smoking in public topographic points should be banned because second-hand fume will jeopardize non-smokers wellness and it pollutes the enviroment. We will write a custom essay sample on Vegetarianism Essay Research Paper Cigarette SmokingFor a or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Smokers feel they have had the right to smoke in a public topographic point for so long that it should non be taken off. Resturants and concerns should be allowed to put their ain smoke regulations, based on demands of the clients. Besides concern may diminish if they do non let tobacco users the right to smoke, ecspecially bars and eating houses. The work topographic point is another job for tobacco users, now they have to travel outside even in the winter to hold a coffin nail, even though they used to be able to smoke inside.A strong protagonist on tobacco users rights is Democratic Assemblyman Dick Floyd, who wanted to vote for a controversial tobacco users right measure. He feels it is non a smoke measure, it simply protects the people who use legal substances such as baccy and intoxicant in their places from occupation favoritism. However, smoking in public topographic points is a danger to non-smokers wellness for the ground of passive or second-hand fume. The populace does non recognize the important jeopardies of inactive smoke. A U.S enviromental protection bureau stated second-hand fume is the 3rd major cause of lung malignant neoplastic disease in the United States. The simple separation of tobacco users within the same air infinite may cut down, but does non extinguish exposure to passive fume. In Arizona five 1000 and six hundred Americans died in 1989 due to p assive fume. A recent federal Environmental protection bureau reported on the dangers of 2nd manus fume. They found this kills 53 1000 non tobacco users a twelvemonth. By seting a smoke free policy into consequence, it will direct a strong message about protecting wellness. Even though designated countries are set aside for tobacco users this does non truly protect a non-smoker. The warming and air conditions does non filtrate out carcinogens good plenty and the fume impetuss onto non-designated countries. Finally, if public smoke is unbroken legalized we will hold major jobs confronting the environment. One job is alot of people are irritated by baccy fume. A adult male named General C.Everett Knoop released a study stating that inactive smoke, when a non-smokers breathe fume in an enclosed country, it causes every bit many as five deceases a twelvemonth. Smoking in a populace topographic point is an air pollutant and it can damage wellness in a figure of ways. The four major wellness jeopardies fall into air, H2O, and noise pollution. Air pollution can take to assorted signifiers of respiratory disease. The chief job of smoke in a public topographic point is indoor air pollution. Some of these jobs that result indoor air pollution is constructing airing that has been reduced to conserve energy, with the consequence that ventiliation is merely unequal. Combustion by merchandises from smoking baccy have produced substances, fume included, that contaminate indoor air. The job set uping a individual who is in a contaminated enviroment may ensue in coughing, whezzing, chest stringency, muscular achings, icinesss, concerns, febrility and weariness. To work out this we have to hold excess airing and maintain designated countries in the public topographic points if there are any. Although some claim that smoking in a public topographic point is their right and should be kept that, smoking in public topographic points should non be legalized because it will jeopardize non-smokers from inactive fume and it pollutes our enviroment. The province of New York will stay curtailing smoking to designated countries. Cigarettes are the most deathly wont, impacting the greatest figure of people in the universe today. A prohibition on public smoke would make a healthier state. 322

Wednesday, December 4, 2019

Cloud Computing for Communication and Electronics -myassignmenthelp

Question: Discuss about theCloud Computing for Communication and Electronics Systems. Answer: Introduction A cloud computing refers to a distinct environment related to information technology that mainly for the purpose of provisioning remotely measured and scalable Information technology resources. The term cloud computing is a metaphor for the internet which is in essence, a network of network which mainly provide access by means of remote position of information technology resources that is decentralized (Xia et al., 2016). Earlier cloud was represented to as an internet in a mainstream documentation and variety of application. Clouds can be used as a service which can be easily be distinguishable and used for a variety of service which is needed by the organization. It is very much essential to distinguish the term cloud and the symbol associated with it. A cloud has a finite boundary as a specific environment used in remote provision of information technology resources. There are wide ranges of cloud used that can be accessible through the internet. The internet provides open access to the internet to many resource which is it based upon, a cloud is typically private owned and offers IT resources access that can be measured (Hwang, 2017). The internet is mainly formed to give access to the IT based content which is published via the World Wide Web (www). the It resources that are provided by the cloud computing are dedicated to supply user based access to the capabilities with respect to the technology and processing which is related to the back end. An important factor is that the cloud doesnt allow have to be necessarily webbed based even though it might consist of internet protocols and technologies. The term protocols can be referred to methods and standard that allows the computer to communicate with each other in s structured and pre-defined method. The cloud can be based on the use of any of the It resources which can be accessed remotely (Rittinghouse Ransome, 2016). The report mainly puts emphasis on the different services of cloud computing. The main lime light would be put on the Infrastructure as a Service approach and the PaaS approach, taking into account the various advantage and disadvantage related to the approach. The Infrastructure as a Service Approach Infrastructure as a Service (IaaS) is a kind of cloud computing that provides virtualizes the computing resources over the internet. IT is a self-service model that accesses, monitors and manages the remote datacenter infrastructure, such as computer that is virtualized, storage, network or networking services like firewalls (Hwang, 2017). User can purchase Infrastructure as a Service instead of buying hardware outright based on the consumption it has. Comparing Infrastructure as Service users to other approaches, this method is responsible for managing data, middleware, applications, and runtime and OS systems. Infrastructure as a Service providers offer database systems, messaging query, servers, hard drives and networks above the virtualization layer. User can install the required platform with Infrastructure as a Service infrastructure on top. The management aspect of the virtual machine is less which can be highly beneficial for the user prospective but still this is also handle d by the service provider of the cloud (Talluri, 2016). The user should pay close attention to the term which is pre defined in the service document or agreement. Common terms can be redefined by the cloud provider in different ways that are specific in the part of the cloud service provider. But if new versions are available the users are themselves responsible for updating the system. An Infrastructure as a Service approach to migrate the Webbs database to the cloud is a good approach since in Infrastructure as a Service system maintenance is automatic and handles tasks like backup and resiliency planning (Kachele et al., 2017). Infrastructure as a Service platform offers highly scalable resources that can be further adjusted on demand. Infrastructure as a Service gives a policy based service and desktop virtualization which helps customers to pay on use-basis (Vaquero, 2016). This pay-as-you-go model helps in eliminating the capital expense. But there is sometimes some chance of getting charged by unauthorized services. Hence, Webbs store should only be aware of the data breaches that can occur during the transmission. Leading Infrastructure as Service providers includes Windows Azure, Amazon Web Services (AWS) etc (Brodkin, 2017). The Platform as a Service Approach Platform as a Service (PaaS), are mainly a prospective to implement applications and developments with aspect to cloud components to the software. Platform as a Service is considered as a framework that can build upon to develop application. Platform as a Service makes the testing, development and deployment of applications quicker, simpler and cost effective. With this technology management of Platform as a Service gets easy the enterprise operation or the third party provides server, storages and networks are hence are manageable. Platform as a Service as compared to other approaches, the enterprises provide a line-of-business software development and self-service portal to manage the computing infrastructure (Yadav Doke, 2016). The centralized IT operations and the platform installed on the top of hardware is also been managed. This delivers hybrid model using both public Infrastructure as a Service and a private Platform as a Service. Platform as a Service allows creating applic ations using the software components that are built in the middleware (Rittinghouse Ransome, 2016). It is cost effective in comparison to Infrastructure as a Service, as the user has essentially has the lease over the software platform not the resource. Platform as a Service application inherits the cloud characteristics such as scalability, high availability, and more. Platform as a Service approaches to migrate Webbs database to the cloud, but the greatest disadvantage would be its not having any control over the platforms depending on cloud provider. There is a security issue as there is no record of the database transferred. This is a shared platform hence takes time as compared to other approaches. Less cost effective make the platform unusable for the Webbs store organization since cost managing is the biggest task in any retailer store (Almorsy, Grundy Mller, 2016). In a cloud computing process there always lies the advantages also come with the challenges even. Business intelligence (BI) and cloud computing area ideal match in every aspect of the technology; the first provides the right information to the right people at the right time while the other is an agile way in order to access the BI applications. To make the best out of the technology strategic iterative approach to the implementation in order to explore hybrid solution of the cloud this involves the business and the IT teams. Advantage and Disadvantage Of Each Approach Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Advantage Disadvantage Advantage Disadvantage The user has full control over the virtual machine and everything related to it. They can build their own virtual machine or automate the provision. Infrastructure as a Service is the most expensive approach, since with respect to the customer is now leasing a resource which is tangible. The cloud provider charge for every cycle, every bit of disk space used and RAM It is cost effective in comparison to Infrastructure as a Service, as the user has essentially has the lease over the software platform not the resource There is no information about the data as there is no full control over the virtual machine or the data which is to be processed. The user can run anything inside the virtual machine (Jamil Zaki, 2016). The user is directly responsible for the backup(Hwang, 2017). Own software can be run on the platform as a result of which there is full control over the software and the system Depending upon the cloud provider there is no possible control over it. There is full control of processing inside the virtual machine Differentiating between SaaS or PaaS, customer is responsible for all the aspect with virtual machine There is full control in the hand of the user accessing the software and the data which is to be processed. It is mainly a shared platform for example there can be other users who run an application on the same website. It simplifies the infrastructure related to enterprise (Zissis Lekkas, 2017). There is still no control regarding which server or the physical or geographical location of the virtual machine (Yadav Doke, 2016). Due to the overall access of the software and the data there is improved integration of the system with other system (Krutz Vines, 2017). The task which is management is mainly considered to be time consuming as well as tedious. The user is directly responsible for upgrades and updates of the application. The Infrastructure as a Service is the most secured cloud service which uses PuC which is due to a greater control over the virtual machine (Carlin Curran, 2017). The management aspect of the virtual machine is less which can be highly beneficial for the user prospective but still this is also handled by the service provider of the cloud (Talluri, 2016). The approach is not as cost effective as SaaS and not as much control over the virtual system as in case of IaaS (Dave, Patel Bhatt, 2016). The user in essence can run their own virtual machine and gain control over the virtual machine without the overhead of maintenance and cost (Di Spaltro, Polvi Welliver, 2016). Recommendation Cloud computing is the most talked topic with its innovative approach and implementation. The most interesting point to include in the technology of cloud computing is that it has redefined cloud computing which can be included in anything that we do. There is consistent theme regarding cloud computing in order to represent a major paradigm shift. Recommendation 1: the user should pay close attention to the term which is pre defined in the service document or agreement. Common terms can be redefined by the cloud provider in different ways that are specific in the part of the cloud service provider. Recommendation 2: the use should carefully access whether the service document specifies the compliance with the appropriate regulation and laws governing the data consumers. Recommendation 3: the emphasis should be put into the term that all the necessary consumer needs are addressed by the service provider. Recommendation 4: specific service agreement should be negotiated with the providers. Remedies for any failure related to it are likely to be extremely limited; consumer may which to formulate and negotiate remedies that re commensurate with the damage aspect that might be sustained. Recommendation 5: depending upon the details of the agreement of the service, a service provider may change the term of service with can be related to a specific level. Change in it would directly affect the price factor and the quality of service. It is mainly a prudent to develop plans in order to migrate workload to alternate cloud providers. Recommendation 6: the security aspects should also be taken into consideration, the search for any comment on whether the cloud provider recommends independent backup of data stored in their cloud. Conclusion It is a no secret that the cloud computing is revolutionizing the IT industry. It is also coping up with the business intelligence (BI) landscape and touching every aspect of it. As the adaptation of the cloud is growing business organizations of all size, they are realizing its benefits. The technology is highly beneficial from the aspect of small, medium to start up business that does not have the effort to maintain the costly server maintenance but have an aim to scale overnight. The advantages also come with the challenges even in every sphere of the implementation of the technology. Business intelligence (BI) and cloud computing area ideal match in every aspect of the technology; the first provides the right information to the right people at the right time while the other is an agile way in order to access the BI applications. To make the best out of the technology strategic iterative approach to the implementation in order to explore hybrid solution of the cloud this involves the business and the IT teams. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. Brodkin, J. (2017). Gartner: Seven cloud-computing security risks. Infoworld, 2008, 1-3. Carlin, S., Curran, K. (2017). Cloud computing security. Dave, A., Patel, B., Bhatt, G. (2016, October). Load balancing in cloud computing using optimization techniques: A study. In Communication and Electronics Systems (ICCES), International Conference on (pp. 1-6). IEEE. Di Spaltro, D., Polvi, A., Welliver, L. (2016). U.S. Patent No. 9,501,329. Washington, DC: U.S. Patent and Trademark Office. Hwang, K. (2017). Cloud and Cognitive Computing: Principles, Architecture, Programming. MIT Press. Jamil, D., Zaki, H. (2016). Cloud computing security. International Journal of Engineering Science and Technology, 3(4). Kachele, S., Spann, C., Hauck, F. J., Domaschka, J. (2013, December). Beyond IaaS and PaaS: An extended cloud taxonomy for computation, storage and networking. In Utility and Cloud Computing (UCC), 2013 IEEE/ACM 6th International Conference on (pp. 75-82). IEEE. Krutz, R. L., Vines, R. D. (2017). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Rittinghouse, J. W., Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press. Talluri, S. (2016). Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services. IJSEAT, 4(6), 287-289. Vaquero, L. M. (2016). EduCloud: PaaS versus IaaS cloud usage for an advanced computer science course. IEEE Transactions on Education, 54(4), 590-598. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608. Yadav, D. S., Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework. Zissis, D., Lekkas, D. (2017). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.