Preferred Language
Articles
/
IhbmuYcBVTCNdQwCll-4
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.

Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 19 2024
Journal Name
Eximia
Job pressures affecting the quality of teachers’ performance at the College of Physical Education and Sports Sciences/University of Baghdad
...Show More Authors

The research aimed to prepare a measure of job stressors affecting the quality of teaching performance in the College of Physical Education and Sports Sciences at the University of Baghdad, to identify their levels, if any, and the most influential dimensions on the quality of teaching performance within the college’s work environment, as well as the deanship’s ability to help prevent and Alleviating its severity through logical administrative methods, on a scale that includes four dimensions that include (the administrative and financial environment, the organizational environment, the social and humanitarian environment, and the scientific and research environment). The descriptive approach was adopted using the case study met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal Of Agricultural Sciences
THE TAXONOMICAL SIGNIFICANT OF COMPUTERD PHYLOGENETIC ANALYSIS AND MORPHOLOGICAL DATA IN SOME SPECIES OF POLYGONACEAE
...Show More Authors

This research dealt with study of cladistics taxonomy of  five  species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This  research support strongly delimiting  the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as  the seed forms were ranging from lenticular to trigonous. In terms of size calculations,  the seeds of R. vesicarius  was recorded the higher range (4.0- 4.5) mm in length w

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)
...Show More Authors

      Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Study Impact of Some Factors on Daily Number of Hours Providing of Electricity in Baghdad City Using Path Analysis
...Show More Authors

دُرِست العوامل المؤثرة في عدد ساعات تجهيز الكهرباء في مدينة بغداد، وتكونت عينة الدراسة من (365) مشاهدة يومية لعام 2018، وتمثلت بستة متغيرات استعملت في الدراسة. كان الهدف الرئيس هو دراسة العلاقة بين هذه المتغيرات، وتقدير تأثيرات المتغيرات التنبؤية في المتغير التابع (عدد ساعات تجهيز الكهرباء في مدينة بغداد). ولتحقيق ذلك استعملت نمذجة المعادلات الهيكلية/ تحليل المسار وبرنامج AMOS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
identifying the reasons of electronic smoking spreading (VAPING) in the society with practical application using Analytical Factors
...Show More Authors

We have investigated in this research, the contents of the electronic cigarette (Viber) and the emergence of the phenomenon of electronic smoking (vibing) were discussed, although the topic of smoking is one of the oldest topics on which many articles and research have been conducted, electronic smoking has not been studied according to statistical scientific research, we tried in this research to identify the concept of electronic smoking to sample the studied data and to deal with it in a scientific way. This research included conducting a statistical analysis using the factor analysis of a sample taken randomly from some colleges in Bab Al-medium in Baghdad with a size of (70) views where  (КМО) and a (bartlett) tests

... Show More
View Publication Preview PDF
Crossref