Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The Noble Qur’an is the book of God, the Blessed and Exalted, in which is the teachings of God Almighty’s religion, which is Islam, in order for people to unite it and establish servitude to it. The individual and the society alike saw it appropriate to make my opinion alerting the seriousness of this matter, so the research was entitled (The Impact of Sins and Disobedience on the Individual and Society in the Holy Qur’an - Objective Study), knowing that we touched upon some of the effects, which we found it appropriate to mention in this research in the service of the good. Its details came in the Holy Qur’an without referring to others, noting their arrangement in the Holy Qur’an..
This research sheds light on one of the important and vital topics for the banking sectors (technical requirements for the application of economic intelligence) namely by (Hardware, equipment, communication networks, software, databases). And the dimensions of the strategic success of the banks represented by(Customer satisfaction, customer trust, quality of service, growth) In the three Iraqi private banks, namely(Assyria International Investment, Mansour Investment, International Development Investment and Finance). Its implementation is an urgent necessity in order to improve the quality of its banking services to win the satisfaction of its customers and their confidence and then grow to achieve stra
... Show MoreThis study was carried out to investigate the possibility of chickpea soaked water as a substitute for yeast in dough fermentation and its effects on sensory properties of the laboratory loaf bread. Chickpea was soaked for 24,48 and 72 hours at room temperature and used in proportion with or without yeast in dough fermentation . The results revealed that , as the percentage of soaked chickpea water substitution increased, the volume of the produced loaf bread decreased as compared with the control treatment (only yeast ).Best results were obtained by using soaked chickpea water for 24 hours in proportion of 1:1 soaked chickpea water : yeast regarding the sensory properties ,volume and leavening of the loaf bread.
Keywords: chickpea so
That the structural changes in the environment, business and finance and the spread of business and the diversity of transactions between economic organizations and breadth of a commercial scale in the world have left their clear on the need to keep up with the accounting for these variables as one of the social sciences affect and are affected by the surrounding environment because of the various economic and social factors, technical, legal and others.
As a result of these variables emerged a new field of accounting called Forensic Accounting, which involves the use of expertise of multiple pour in the end to the accounting profession, where the Forensic Accounting cover a large area of disciplines including strengthening
... Show MoreThe aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the
... Show More3D models delivered from digital photogrammetric techniques have massively increased and developed to meet the requirements of many applications. The reliability of these models is basically dependent on the data processing cycle and the adopted tool solution in addition to data quality. Agisoft PhotoScan is a professional image-based 3D modelling software, which seeks to create orderly, precise n 3D content from fixed images. It works with arbitrary images those qualified in both controlled and uncontrolled conditions. Following the recommendations of many users all around the globe, Agisoft PhotoScan, has become an important source to generate precise 3D data for different applications. How reliable is this data for accurate 3D mo
... Show MoreThe phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi
Spatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- south
... Show More