Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreIn this work, two groups of nanocomposite material, was prepared from unsaturated polyester resin (UPE), they were prepared by hand lay-up method. The first group was consisting of (UPE) reinforced with individually (ZrO2) nanoparticles with particle size (47.23nm). The second group consists of (UPE) reinforced with hybrid nanoparticles consisting of zirconium oxide and yttrium oxide (70% ZrO2 + 30% Y2O3) with particles size (83.98nm). This study includes the effect of selected volume fraction (0.5%, 1%, 1.5%, 2%, 2.5%, 3%) for both reinforcement nano materials. Experimental investigation was carried out by analyzing the thermo-physical properties like thermal conductivity, thermal diffusivity and specific heat for the polymeric composit
... Show MoreThe research focuses on addressing one of the most important concepts of modern management that deal with the relationship between government institutions and stakeholders, Which now occupies a special significance in trends modern management, a concept of corporate governance it takes the internal mechanisms due to its key role and is important in the process of corporate governance and looking for building Effective mechanisms for this concept in light of laws and regulations that are available in the local environment and on the functioning of government institutions, Search has been applied in the Federal Board of Supreme Audit of Iraq (BSA) due to its particular importance as an institution control and as a awaits the societ
... Show MoreA new Schiff base [1-((2-(1H-indol-3-yl)ethylimino)methyl)naphthalene-2-ol] (HL) has been synthesized by condensing (2-hydroxy-1-naphthaldehyde) with (2-(1H-indol-3-yl)ethylamine). In turn, its transition metal complexes were prepared having the general formula; [Pt(IV)Cl2(L)2], [Re(V)Cl2(L)2]Cl and [Pd(L)2], 2K[M(II)Cl2(L)2] where M(II) = Co, Ni, Cu] are reported. Ligand as well as metal complexes are characterized by spectroscopic techniques such as FT-IR, UV-visible, 13C & 1H NMR, mass, elemental analysis. The results suggested that the ligand behaves like a bidentate ligand for all the synthesized complexes. On the other hand, theoretical studies of the ligand as well its metal complexes were conducted at gas phase using Hyp
... Show MoreRemoving Congo red (CR) is critical in wastewater treatment. We introduce a combination of electrocoagulation (EC) and electro-oxidation (EO) to address the elimination of CR. We also discuss the deposition of triple oxides (Cu–Mn–Ni) simultaneously on both anodic and cathodic graphite electrodes at constant current density. These electrodes efficiently worked as anodes in the EC-EO system. The EC-CO combination eliminated around 98 % of the CR dye and about 95 % of the Chemical Oxygen demand (COD), and similar results were obtained with the absence of NaCl. Thus, EC-EO is a promising technique to remove CR in an environmentally friendly pathway.
اثناء تفاعل الديزنة تكونت صبغة أزو جديدة عن طريق تفاعل 3-امينوفينول مع 2,4,6-ثلاثي هيدروكسي اسيتوفينون . ثم تم تفاعل هذا الليكاند مع بعض ايونات العناصر الكروم والحديد الروديوم والروثينيوم بتكفؤهم الثلاثي والكوبلت الثنائي والموليبدينوم سداسي التكافؤ مكونة معقدات فلزية مختلفة بأشكال هندسية متعددة. تم ملاحظة تناسق مجموعة الازو مع ايونات العناصر من خلال ملاحظة ظهور حزم امتصاص الفلز مع النتروجين والاوكسجين ب
... Show MoreThe study aimed to examine the impact of audit committee characteristics on the practices of intellectual capital disclosure in the annual reports of Bank and Insurance companies listed on Palestine Exchange, through performing content analysis of the annual reports for the study sample which totaled thirteen companies, including six banks and seven insurance companies. To achieve the study objectives, the study employed a content analysis approach in order to analyze the content of the intellectual capital disclosure practice, in addition, the study used cross-sectional with longitudinal data for time series for a period of time between 2014-2019. The empirical results indicated that financial expertise and the number of meeting
... Show MoreWith today's rapid and full of dangers the world banking sector is one of the most vital sectors at risk, and on the supervisory bodies responsible for monitoring the work of banks to take an active role in influencing the banks and put on the right track and is compatible with internationally approved curriculum. The lie of the research problem in the weak supervisory role of the Central Bank for banks in general and private banks in particular, limited the process of performance audit carried out by the Federal Office of Financial Supervision in auditing oversight role of the Central Bank control over the banks, according to the methods of performance audit followed by the upper bodies of financial control and accounting, And it was ba
... Show More