Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The other day in the Holy Quran and the four Gospels
The nature of the political system of any country in the international system must have an impact on the policy of the State, whether in the interior or exterior, both regional and international, Turkey is one of the most important countries in the Middle East, which have a place and effectiveness on the surrounding environment, hence the importance of research lies in its political system and the transfer of power in it and its transformation from the form of the parliamentary system to the presidential system of the repercussions of the task and mutual effects between Turkey and the countries of the surrounding region in terms of the extent of achieving political stability in the Turkish interior or not and how this can be refl
... Show MoreThe present search addressed the " leadership skills and their impact on strategic planning " Where has the objective of leadership skills and strategic planning of increasing importance at the present time , for being fairly modern topics ,which have a tremendous impact on the success of organizations.. &n
... Show MoreThe research aim to know the effect of note–taking by computer method as amentalactivators in achievement of physics subject for the first intermediate class students.
To investigate from aim of the research the research sample was chosen from the first intermediate class students in Al–mutamyzat secondary school for girls. Which belongs to the general administration for the second karkh education which randomly chosen from (9) schools for distinct female students in Baghdad. Then randomly chosen two sections form three about (80) female students at (66.667%) from total sample it’s about (120) female student in the three sections. The randomly chosen too, section (a) to represent experimental group it’s about (41) female
... Show MoreAllowing Iraqi companies to use multiple systems and policies leads to varying levels of disclosure and no high symmetry between report preparers and users, and that the adoption of integrated reporting can reduce information asymmetry. The theoretical side addressed the concepts of these variables, and in the practical side the binary variable (0, 1) was used. To compensate for the value of the independent variable (integrated reporting) based on the Central Bank of Iraq’s classification of banks according to the (CAMLES) index, and the dependent variable (information asymmetry) was measured through two measures (price difference, unusual return), the research community was represented by (5) Banks out of the total of banks li
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreRecurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al
... Show MoreThis research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu
... Show MoreBackground: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th
... Show More