Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show MoreThe research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.
The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreMedia writing is accuracy writing. Clarity and concision are its predominant features. It is a writing that goes straight to the essence because it has no time to waste. Furthermore, it must be as accurate as scientific writing. It is destined for the average reader and has to be understood by everyone. However, it can be as elegant as literary writing. The variety in its forms of expression does not prevent media writing from having its own amplitude.
In short, this study is a practical approach that aims at studying different kinds of writing styles and identifying the specificity of media writing using some patterns and examples
ABSTRACT
Impkact of Knowledge sharing on organizational innovation Impriscal study in Arabic company .
of Knowledge Management is the main component Knowledge sharing system, it mean the exchange if Knowledge, ideas, and good practice with another individual . Knowledge sharing between persons, then its values can growth .
It is vry important because it can provide us with the contention between virus peoples . the interaction among the people can pass all kind of Knowledge among them. the connection and interaction and interaction enabl
... Show MoreThe current research aims to diagnose the extent of interest in knowledge sharing and its role in achieving organizational excellence at the level of the Iraqi environment Primary data through descriptive statistics (arithmetic mean, standard deviation, coefficient of variation, percentages, frequencies) and hypothesis testing using appropriate statistical methods for inferential statistical analysis (Pearson correlation coefficient, simple linear regression, multiple regression, path analysis) and checking the quality of the data from During (normal distribution, confirmatory factor analysis, structural modeling method, and exploratory factor analysis), after collecting data from (358) observations from the company’s leaders, as
... Show MoreThe participation of Vietnamese women in the Vietnam War has not received the attention it deserves. This research paper, presented to the conference of the Department of History/College of Arts - University of Baghdad, held on April 25, 2024, provides a comprehensive overview of the participation of North Vietnamese women in providing military and logistical support during the years of the Vietnam-American War (1964-1975). It shows the belief of Ho Chi Minh, the leader of the Vietnamese national movement, and the Hanoi government in democratic Vietnam, in the ability of North Vietnamese women to assume many new roles that were unfamiliar to Vietnamese society, as well as the factors that led to the involvement of women in the war and the r
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method