Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Adolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives
The aim of this research is to employ the roundhouse strategy to study its impact on the students achievement of the 10th grade in physics and their core thinking. After the application of the research experience and gaining data, which was processed statistically using the statistical packages program (SPSS). The results of the researcher revealed the superiority of the students of the experimental group who studied using the roundhouse strategy on the students of the control group who studied the usual method in the achievement test. As results showed that there were statistically significant differences between the average scores of the experimental group and the average scores of the control group students in the core thinking test and
... Show MoreBackground The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreThe research aims to a statement of specificity of the Controller of (academic achievement, specialty, job title, length of service, Gender) and its impact on performance, Through a proposed appraisal form includes three main axes and each axis including several specialized elements in the supervisory work in form (check list). as is the importance of research to enable officials of oversight bodies financial identify and diagnose performance Controller through what has this observer of the process of scientific properties when performing supervisory work. Be summarized problem of the research that the lack of regulatory institution with the Controller interesting in terms of the necessary characteristics and requirements and inv
... Show More|
مجلة العلوم الاقتصادية والإدارية المجلد 18 العدد 69 الصفحات 318- 332 |
The subject of the evolution of fire insurance of the hottest topics accidents, because it falls within the commercial insurance, as its importance is reflected for being a security source and contentment of the insured person and so it is worth pointing out the importance of fire insurance in enterprises and organizations of all kinds, because of the guarantee of its assets from meridian as well as protection from the effects of the fire therefore ensure continuity in the performance of their activities