Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of cognitive sharing on strategic anxiety: Analytical research into the Iraqi Airways Company
...Show More Authors

The current research aims to test the effect of knowledge sharing in its dimensions represented by(individual dimension, organizational dimension, and technological dimension), In reducing the strategic Anxiety of Iraqi Airways, In view of the importance of the two variables for the company from the perspective of society and the sample resulting from directing various organizational phenomena to reduce its strategic Anxiety, As a goal, it should be viewed from multifaceted perspectives(uncertainty, relational disorder, competitive disorder, resource depletion), And it was embodied by choosing the descriptive, exploratory approach, as it is the most appropriate in that aspect, so that the research questionnaire is one of solid scientific

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
University Of Northampton Pue
Validating a Proposed Data Mining Approach (SLDM) for Motion Wearable Sensors to Detect the Early Signs of Lameness in Sheep
...Show More Authors

View Publication
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Assessing Service Quality using Data Envelopment analysis Case study at the Iraqi Middle East Investment Bank
...Show More Authors

The use of data envelopment analysis method helps to improve the performance of organizations in order to exploit their resources efficiently in order to improve the service quality. represented study a problem in need of the Iraqi Middle East Investment Bank to assess the performance of bank branches, according to the service quality provided, Thus, the importance of the study is to contribute using a scientific and systematic method by applying  the data envelopment analysis method in assessing the service quality provided by the bank branches, The study focused on achieving the goal of determining the efficiency of the  services quality provided by the bank branches manner which reflect the extent of utilization of a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Trees and their impact on humans And the environment from a Qur'anic perspective
...Show More Authors

Show the greatness of Allah Almighty when contemplating the benefits of trees and plants in
Life in general and trees mentioned in the Koran in particular, do not have to meditate that
He acknowledges the greatness of the Almighty Creator, and his preference over man, that he is prepared for his livelihood
And give him what he can do in this life to the fullest.
  The study also stressed the need to urge people to this great blessing trees
By preserving them and wasteful wastefulness.
  The study also pointed to the need to guide people towards the aesthetics and improvements of
Look through and enjoy the beauty of trees, flowers, greenery and fruits ..

View Publication Preview PDF
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Processing of missing values in survey data using Principal Component Analysis and probabilistic Principal Component Analysis methods
...Show More Authors

The idea of ​​carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component  Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Performance Assessment of Solar-Transformer-Consumption System Using Neural Network Approach
...Show More Authors

Solar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both so

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref