Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
A field study was conducted on a sample of the public in Baghdad to study the audience's exposure to the television promotion of pharmaceutical products and their trends in order to determine the rate of exposure of the public to the television promotion of pharmaceutical products according to the theory of uses and rumors and to determine the public's attitudes towards television promotion of pharmaceutical products. A survey of (25) a questions was distributed to a sample of the audience of 150 people. The statistical program SPSS was used to unload the data and for the calculation of frequencies and percentages and correlation coefficients. The research reached several results, Most importantly, the television promotion is well receiv
... Show MoreAbstract
In this paper presents two dimensional turbulent flow of different nanofluids and ribs configuration in a circular tube have been numerically investigation using FLUENT 6.3.26. Two samples of CuO and, ZnO nanoparticles with 2% v/v concentration and 40 nm as nanoparticle diameter combined with trapezoidalribs with aspect ratio of p/d=5.72 in a constant tube surface heat flux were conducted for simulation. The results showed that heat flow as Nusselt number for all cases raises with Reynolds number and volume fraction of nanofluid, likewise the results also reveal that ZnO with volume fractions of 2% in trapezoidal ribs offered highest Nusselt number at Reynolds number of Re= 30000.
Key
... Show MoreABSTRACT
The current research aims at highlighting the role of engagement of a sample of employees who works in some of the Iraqi private banks in terms of their interaction , commitment and enthusiasm and the positive impact they own regarding their job and devote their efforts to achieve the core purpose which is customer loyalty. The problem was expressed through a number of intellectual and practical questions.
In order to achieve the aim of the research the quantitative analytical method was used depending on a questionnaire as a basic tool to collect research data and the qualitative survey method depending on semi-structured interviews which were distrib
... Show MoreThis study examines the relationship between the increase in the number of tourists coming to Tunisia and GDP during the period 1995-2017, using the methodology of joint integration, causal testing and error correction model. The research found the time series instability of the logarithm of the number of tourists coming to Tunisia and the output logarithm but after applying the first differences, these chains become stable, THUS these time series are integrated in the first differences. Using the Johansson method, we found the possibility of a simultaneous integration relationship between the logarithm of the number of tourists coming to Tunisia and the logarithm of GDP in Tunisia, and there is a causal relationship in one direc
... Show MoreBackground: Candida albicans is a prevalent commensal that can cause severe health problems in humans. One such condition that frequently returns after treatment is oral candidiasis. Aim: the goal of this research is to evaluate the efficiency of 940 nm as a fungicidal on the growth of Candida albicans in vitro. Material and Methods: In vitro samples (fungal swabs) were taken from the oral cavity of 75 patients suffering from oral thrush. Following the process of isolating and identifying Albicans. The samples are divided into four groups:(Group 1): Suspension of C. albicans was put in a solution of saline as a control group. (Group 2): Suspension of C. albicans that had been treated wit
... Show MoreThe: currency Auction is one of the monetary policy tools created after 2003, in order to keep pace with the changes that the monetary and financial policies will witness from financial openness and expectations of high levels of liquidity after international economic restrictions. It is necessary to re-evaluate the work of the currency Auction from time to time and observation its efficiency in adjustment the exchange rate And its reflection on the general level of prices as one of the objectives of its inception, and during the analytical aspect, it was confirmed that the currency Auction for selling the currency had a major role in adjustment the exchange rate and controlling inflation levels, due to the market’s dependence
... Show MoreGroundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only abo
... Show MoreThis review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi
... Show MoreIn recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show MoreOne of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the
... Show More