Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Forced Displacement during the Syrian Forced Displacement during the Syrian Crisis, and its Impact on Jaramana’s Children's Education: A Field Study , and its Impact on Jaramana’s Children's Education: A Field Study: نهال ريحاوي جلب , قاسم الربداوي
...Show More Authors

The study aims to examine the problem of forced displacement and its social and economic problems in light of the Syrian crisis. Such an aim helps to know the difficulties and challenges facing the children of displaced families in learning, and the reasons for their lack of enrolment. It also clarifies whether there are significant statistical differences at  among the attitudes of the children of the displaced families towards education regarding the following variables: (the work of the head of the family, the economic level of the family, and the work of the children). The study has adopted the descriptive-analytical approach;  a questionnaire was adopted as a tool to collect information. The study was applied to a sample o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Relationship between Social Anxiety and Mindfulness In Iraqi Women Living In Iraq And The UK; A Comparison Study
...Show More Authors

The continuous pressure of work and daily life and the increasing financial and social stress that Iraqi women are experiencing (both inside and outside Iraq) is one of the main causes of anxiety, particularly in those of working class women. This group of women carry the burden of carrying out multiple roles and responsibilities at the same time. All this collectively make them more prone to developing anxiety compared to men. In addition, the physiological and psychological nature of women, as females, on top of the other roles in life, like being a wife or mother or daughter or sister, all add extra pressure on women especially for those who are considered as productive working individuals in the society. In order to study the relatio

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
A study in Tunisian - Iraqi Relations and its role in determining strategies for dealing with conflict and peace situations
...Show More Authors

If the State attaches great importance to its foreign relations and intends to strengthen them in order to ensure the achievement of the highest national goals and interests. External relations between countries are one of the most prominent features of foreign policy, which depends on a combination of internal and external factors, the modern relations between Tunisia and Tunisia, which goes back to the pre-independence of Tunisia, when Iraq was a supporter of Tunisia's independence from France in the 1940s, Although these relations did not cause any disturbance by the two countries, but they remained weak relations did not develop in all areas except the sports and cultural field, which we will determine the reasons and the pos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Comparative Permeability Estimation Method and Identification of Rock Types using Cluster Analysis from Well Logs and Core Analysis Data in Tertiary Carbonate Reservoir-Khabaz Oil Field
...Show More Authors

Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
Free will between Slavery and Freedom: A Study of Linda Brent in Incidents in the Life of a Slave Girl by Harriet Jacobs
...Show More Authors

Harriet Jacobs was a writer and a reformer. As a female writer in the nineteenth century, Jacobs wrote her narrative as a means of resisting the system of slavery. She wrote her book Incidents in the Life of a Slave Girl: Written by Herself, (1842) to reflect upon the exploitation of the black people and the need to change the hierarchal attitude that governs white/black relations. She was engaged in many abolitionist events and her anti-slavery approach appeared clearly in her writings. She shares Du Bios ideas about freedom and emancipation and the need for a political and cultural change. Thus, Du Bois’s theory provides a framework for her autobiographical novel where she portrays Linda Brent, the main character, a strong w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Some Mechanical Properties of Autopolymerizing Acrylic Resin with the Modified One after Changing the Curing Environment: (In vitro Study)
...Show More Authors

Background: Studying and investigating the transverse strength(Ts), impact strength(Is), hardness (Hr) and surface roughness(Ra) of conventional and modified autopolymerizing acrylic resin with different weight percentages of biopolymer kraftlignin, after curing in different water temperatures; 40°C and 80°C. Material and Methods: Standard acrylic specimens were fabricated according to ADA specification No.12 for transverse strength, ISO 179 was used for impact testing, Shore D for hardness and profilometerfor surface roughness. The material lignin first dispersed in the monomer, then the powder PMMA is immediately added. Ligninadded in different weight percentages. Then cured using pressure pot (Ivomet) in two temperatures;40°C a

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Cathodic Protection for Above Ground Storage Tank Bottom Using Data Acquisition
...Show More Authors

Impressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.

In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Proceedings Of The Aintec 2014 On Asian Internet Engineering Conference - Aintec '14
LTE Peak Data Rate Estimation Using Modified alpha-Shannon Capacity Formula
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref