Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Deposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?
This work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show More
Abstract
Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t
... Show MoreThe aim of the research was to prepare a scale of obstacles to achieving quality performance, field application from the point of view of fourth-stage female students, to identifyOn the difficulties and obstacles to achieving quality performance through field application from the students’ point of view for the topic (school administrative procedures, learners, cognitive achievement, school tools).The researchers used the descriptive approach in the research procedures as it is an appropriate approach to achieve the research objectives.,The following questions were asked:There are obstacles and difficulties faced by female students during the process of choosing schools, dealing with school administrations, and the difficulties fa
... Show MoreBackground: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u
... Show MoreThis research aims toknow the learning styles according to the model of Felder and Silverman and its relationship to effectively self- perceived mathematicalamong students of the Faculty of Education Pure Sciences - Ibn al-Haytham. By answering the following questions: 1. What are the preferred methods of learning among students in the mathematics department according to the model Felder and Silverman? 2. What is the mathematicalself-perceived levelof the students at the Department of Mathematics effectiveness level? 3. What is the relationship between learning styles according to the Felder model and Silverman and the effectiveness of mathematical self-perceived of the students of the Department of Mathematics? The research sample consiste
... Show More