Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The effectiveness of (200 m) of the events of extreme intensity and this is characterized by training in the anaerobic energy system prevailing in the result of this privacy as these are based on the physical abilities and functional indicators identified in this direction and hence the importance of research in the evaluation of training programs on the basis of physical abilities and some indicators of the functionality of the hostile 200 m . The study aimed to: 1. Evaluation of training programs according to physical abilities and some functional indicators of hostile men.The researchers used the descriptive analytical method to suit the nature of the research. The researchers selected them research sample by the deliberate method of the
... Show MoreBACKGROUND: Volar Barton’s fracture is a shearing mechanism of injury that results in fracture and subluxation of distal end radius in which volar rim of the distal radius is displaced with hand and carpus. Open reduction and volar plate fixation ensure more stable change of displacement, preservation of reduction, and early mobilization. AIM: This study aims to assess the functional and radiological outcome results of volar Barton’s fracture treated by volar buttress plate using the demerit points system of Gartland and Werley. PATIENTS AND METHODS: This study is a prospective descriptive observational study on 32 patients who were treated with ORIF by volar buttress plate for isolated volar Barton’s fractures between Fe
... Show MoreThe current study is aimed to identify personality types of the lecturers of Baghdad University as well as identify the prevailing types among the lecturers. In addition, the study aimed to identify the significant difference among personality types (The Enneagram) according to the variables of academic title and scientific major . One hundred and ninety four lecturers were involved in this study. In order to achieve the study's aims, the scale of (Baron& Wagele 1994) was used to measure the nine personality types (The Enneagram) that was translated by( Anwar Omar Ibrahim 2012). Some statistical analysis were used and the result demonstrated that Romantic types was found to be the most prevailing types among the lecturers of Baghdad
... Show MoreA new ligand complexes have been synthesis from reaction of metal ions of MnII , CoII , NiII , CuII , ZnII , CdII and PdII with schiff base [(E)-1-((2-amino-5-(3, 4, 5-trimethoxybenzyl) pyrimidin-4-ylimino) methyl) naphthalen-2-ol [HL)]. The prepared [HL] was characterized by FT-IR, UV-Vis spectroscopy, 1H13CNMR spectra Mass spectra and melting point. The compounds were characterized by techniques UV-Vis and FT-IR spectral studies, micro analysis (C.H.N), determination of atomic absorption, chloride content, molar conductivity measurements, magnetic susceptibility and melting point. The ligand acts as a monobasic tridentate, coordinating through deprotonated phenolic O and azomethine N atoms. The compounds are neutral electrolytic in dimeth
... Show MoreA new ligand 2,3-dihydrobenzo [d] thiazole-2-carboxylic acid (L) has been prepared from the reaction of ortho amino phenyl thiol with dichloroacetic acid in mole ratio (1:1). It has been characterized by elemental analysis (C.H.N.), IR, UV- Vis.spectraand 1H, 13C-NMR. A new series complexes of the bivalent ions (Co, Ni, Cu, Pd, Cd, Hg and Pb) and the trivalent (Cr) have been prepared and characterized too. The structural has been established by elemental analysis (C.H.N.), IR, UV-Vis. spectra, molar conductivity, atomic absorption and magnetic susceptibility measurements. The synthesized complexes were prepared in (1:2) ratio correspond to (Co(II), Ni(II), Cu(II), Pd(II), Cd(II), Hg(II) and Pb(II) complexes while in case Cr(III) complex is
... Show More