Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc
... Show Moreطريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مخ
... Show MoreIn this paper the process of metal ions extraction (Zn(II) and Cu(II)) was studied in PEG-KCl aqueous two phase system was investigated without using an extracting agent. The experimental runs were performance at constant temperature (25 oC), constant mixing time (30 min), and constant PH of the solution (about 3). The effect of KCl salt concentration (from 10% to 25%), volumetric phase ratio of PEG solution to KCl solution (from 0.5 to 2), and the initial metal ion concentration (from 0.25 ml to 2 ml of 1 gm/L solution) were investigated on the percent extraction of Zn(II) and Cu(II). The results indicated that the percent extraction of metal ions increase with increasing of salt concentration and phase ratio, and slightly de
... Show MoreA new ligand 2,3-dihydrobenzo [d] thiazole-2-carboxylic acid (L) has been prepared from the reaction of ortho amino phenyl thiol with dichloroacetic acid in mole ratio (1:1). It has been characterized by elemental analysis (C.H.N.), IR, UV- Vis.spectraand 1H, 13C-NMR. A new series complexes of the bivalent ions (Co, Ni, Cu, Pd, Cd, Hg and Pb) and the trivalent (Cr) have been prepared and characterized too. The structural has been established by elemental analysis (C.H.N.), IR, UV-Vis. spectra, molar conductivity, atomic absorption and magnetic susceptibility measurements. The synthesized complexes were prepared in (1:2) ratio correspond to (Co(II), Ni(II), Cu(II), Pd(II), Cd(II), Hg(II) and Pb(II) complexes while in case Cr(III) complex is
... Show MoreThis paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More