Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The deliberative system of communicative studies is exposed to cultural openness, according to modern cultural studies, to establish a verbal language system that achieves reciprocal and cross-cultural relations. This research has examined the concept of deliberative approach in the contemporary Iraqi theater text by studying the deliberative system of text and its interrelationship with The stage of the verbal embodiment of the dramatic event, because the dramatic text achieves in its construction of racism, a deliberative approach between the verbal event and the language, and what later leads to the completion of the dramatic action. The research included four chapters. The first chapter was the systematic framework of the research, T
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreResearch summary
Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.
Islam laid down moral principles in war, including:
- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.
- Not to be exposed to non-combatants, including women, boys, the elderly, the disa
... Show MoreIraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall. This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi
... Show MoreThe achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they includ
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreRemote sensing provide the best means to monitoring change in vegetation over a wide range of temporal scales over large areas. In this study, the vegetation index which has been applied known as the Stress Related Vegetation Index (STVI) on in the area around the Euphrates River and part of Al-Habbaniyah lake which located at western side of the river in Ramadi city, Al-Anbar province at Iraq to study the vegetation cover changes and detect the areas of changes, using two satellite sensors multispectral images such as TM and ALI, after geometric correction procedure to rectifying these images. The STVI-4 index result was the best than other vegetation indices (STVI-1 and STVI-3) to discriminate the vegetable cover distribution. The diff
... Show MoreHS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020