Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The turning process has various factors, which affecting machinability and should be investigated. These are surface roughness, tool life, power consumption, cutting temperature, machining force components, tool wear, and chip thickness ratio. These factors made the process nonlinear and complicated. This work aims to build neural network models to correlate the cutting parameters, namely cutting speed, depth of cut and feed rate, to the machining force and chip thickness ratio. The turning process was performed on high strength aluminum alloy 7075-T6. Three radial basis neural networks are constructed for cutting force, passive force, and feed force. In addition, a radial basis network is constructed to model the chip thickness ratio. T
... Show MoreThree N-(hydroxylphenyl) dimethylmaleimides were directly prepared in good yields (81-86)% from the reaction of dimethylmaleic anhydride with amino phenols. The prepared imides were esterified to the corresponding benzoates, methacrylates and cinnamates via their reaction with different acid chlorides in the presence of triethylamine. The prepared esters were tested as plasticizers for PVC via preparing of thirty six samples of PVC with the prepared esters in certain weight ratio followed by recording their softening points. Comparison the results with the universal plasticizers for PVC (DOP) and (DBP) indicated that the prepared esters in general have high plasticizing efficiency.
In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the
... Show MoreScientists have mastered the codification of the hadeeth and authorship in it, and walked in a variety of courses, including what is known when the late books seal books, which is inclined by Sheikh Sheikh students in the last Council is reading a book of the books of the year or so, and mention a party from the translation of the book owner After that methodology of what he sees important, then speak to the last hadeeth in the book Sindh and Manta, and sometimes market attribution to the author of the book as did Suleiman al-Jamal (God's mercy) deceased in 1204 AH, in this seal on the true Imam Bukhari Which we will investigate and publish. (God willing).
Abstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreMetal complexes of Mn(II), Co(II), Ni(II), Cu(II), Cd(II), Zn(II), Hg(II), Pd(II), and Pt(II) with Schiff base ligand (LH) derived from 2,5-dichloroaniline and 2-hydroxy-5-metheylbenzalaldehyde were synthesized and characterized using a variety of spectrophotometric techniques The findings of the spectroscopic analysis indicated that (LH) behaved as a binary coordinating agent to the metal ion by the N and O atoms, and the geometry shape of the complexes was octahedral, with the exception of the Pd and Pt complexes, which had a square planar geometry. Using the DPPH radical scavenging method, we investigated the antimicrobial activity of the compound against Staphylococcus aureus and Escherichia coli, as well as the antifungal activity of t
... Show MoreIn the present study, nanoporous material type MCM-41 was prepared by the sol-gel technique and was used as a carrier for prednisolone (PRD) drug delivery. The structural properties of mesoporous were fully characterized by X-ray diffraction (XRD), N2 adsorption /desorption and Fourier-transform infrared (FTIR). The mass transfer in term of adsorption process (loading) and desorption process (releasing) properties were investigated. The maximum drug loading efficiency was equal to 38% and 47.5% at different concentrations. The PRD released was prudently studied in water media of pH 6.8 simulated body fluid (SBF) in according to "United State Pharmacopeia (USP38)". The results proved that the release of prednisolone from MCM-41
... Show MoreRecent studies have revealed some conflicting results about the health effects of caffeine. These studies are inconsistent in terms of design and population and source of consumed caffeine. In the current study, we aimed to evaluate the possible health effects of dietary caffeine intake among overweight and obese individuals.
In this cross-sectional study, 488 apparently healthy individuals with overweight and obesity were participated. Dietary intake was assessed by a Food Frequency Questionnaire (FFQ) and
A new class of biologically active nanocomposites and modified polymers based on poly (vinyl alcohol) (PVA) with some organic compounds [II, IV, V and VI] were synthesized using silver nanoparticles (Ag-NPs). All compounds were synthesized using nucleophilic substitution interactions and characterized by FTIR, DSC and TGA. The biological activity of the modified polymers was evaluated against: gram (+) (staphylococcus aureus) and gram (-): (Es cherichia coli bacteria). Antimicrobial films are developed based on modified poly (vinyl alcohol) MPVA and Ag-NPs nanoparticles. The nanocomposites and modified polymers showed better antibacterial activities against Escherichia coli (Gram negative) than against Staphyloc
... Show More