Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MoreAbstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar
... Show MoreAbstract
The aim of the research is to measure the effect of changing the exchange rate on bank loans, and in order to achieve this goal, the (official exchange rate) was chosen as an independent variable and its effect was studied on the dependent variable, which is bank credit. Commercial Gulf, Baghdad, A Shore International for Investment (and the financial indicators (growth rate of loans) and the statistical program (Eviews 12) were used to measure the impact of the exchange rate change on the bank credit of banks, the research sample for the period 2012-2022, and the research reached a group Among the conclusions, the most important of which is that the
... Show MoreNatural convection heat transfer is experimentally investigated for laminar air flow in a vertical circular tube by using the boundary condition of constant wall heat flux in the ranges of (RaL) from (1.1*109) to (4.7*109). The experimental set-up was designed for determining the effect of different types of restrictions placed at entry of heated tube in bottom position, on the surface temperature distribution and on the local and average heat transfer coefficients. The apparatus was made with an electrically heated cylinder of a length (900mm) and diameter (30mm). The entry restrictions were included a circular tube of same diameter as the heated cylinder but with lengths of (60cm, 120cm), sharp-edge and
... Show MoreThe tax revenues achieved through projects of transition to private sector are regarded as an important source for using in achieving political, economic and social objectives. Since Iraq is heading towards free market economy, new strategies should be adopted to reform the taxation system from by a qualified taxation management office and to activate the taxation policy and to reconsider legislation in relation to the aware of the legible to the importance of disclosure of their taxable real income in order to arrive at contribution of privatization in the taxation revenues for the important role effect on economic activities. In the light of the above, the research is based upon a hypothesis which stipulates that privatization contribu
... Show MoreBasic Orientation and search path in determining the impact of creative thinking in cultural intelligence field research on the doctors competence, as is a theme of creative thinking great importance in spite of being a old , but his role at the individual level and / or organizational a sustainable effect toward developing a fact uncommon , any sense that one of the pillars of modernity and provide a unique future, as is the competitive weapon of the organizations in an environment dubbed fundamental change and provide all that is unfamiliar, and in the center of the field of research and objective measurement of creative thinking on doctors specialists at the construction of a state of the preference and
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreThe evaluation process of transportation problem required finding basic feasible solution (bfs). Represent the base of decision making process. To purpose start anther batter solution to able from decisions taking process, consider the decision making process, find (bfs) represent the standard form in linear programming (LP). Most important stage of update (bsf) stages that achieved minimum cost (the optimal solution). the goal of paper to improving & evaluation (bfs) by new procedure (proposed method) comparison with Vogel method.
In this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error
... Show More