Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2024
Journal Name
Al-mustansiriyah Journal Of Science
A Transfer Learning Approach for Arabic Image Captions
...Show More Authors

Publication Date
Mon Apr 17 2023
Journal Name
Wireless Communications And Mobile Computing
A Double Clustering Approach for Color Image Segmentation
...Show More Authors

One of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Middle-east Journal Of Scientific Research
Question Classification Using Different Approach: A Whole Review
...Show More Authors

Preview PDF
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Tue Jun 18 2024
Journal Name
2023 Asee Annual Conference & Exposition Proceedings
Study of Artificial Intelligence Computing Devices for Undergraduate Computer Science and Engineering Labs
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Business, Communication & Technology
Exploring the Adoption of Big Data Analytics in the Oil and Gas Industry: A Case Study
...Show More Authors

The oil and gas industry relies heavily on IT innovations to manage business processes, but the exponential generation of data has led to concerns about processing big data, generating valuable insights, and making timely decisions. Many companies have adopted Big Data Analytics (BDA) solutions to address these challenges. However, determining the adoption of BDA solutions requires a thorough understanding of the contextual factors influencing these decisions. This research explores these factors using a new Technology-Organisation-Environment (TOE) framework, presenting technological, organisational, and environmental factors. The study used a Delphi research method and seven heterogeneous panelists from an Oman oil and gas company

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
The Role of Binary Settings in John Updike’s Short Stories: A Structuralist Approach: مؤيد انوية ججو الجماني
...Show More Authors

John Updike’s use of setting in his fiction has elicited different and even conflicting reactions from critics, varying from symbolic interpretations of setting to a sense of confusion at his use of time and place in his stories.  The present study is an attempt at examining John Updike’s treatment of binary settings in Pigeon Feathers and Other Stories (1962) to reveal theme, characters’ motives and conflicts.  Analyzing Updike’s stories from a structuralist’s perspective reveals his employment of two different places and times in the individual stories as a means of reflecting the psychological state of the characters, as in “The Persistence of Desire”, or expressing conflicting views on social and political is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
International Journal Of Entrepreneurship
The moderating effect of business environment on the relationship between entrepreneurial skills and small business performance in Iraq
...Show More Authors

The purpose of this study is to examine the moderating role of business environment on the relationship between Entrepreneurial Skills (ES) and business performance of Small Business (SB) in Iraq, Baghdad. This study aims to resolve the inconsistencies found in the contemporary literature regarding the relationship between ES and business performance. Questionnaire using a 5-point Likert scale was adopted from previous work to ascertain the responses of the respondents. Survey research design was adopted, and self-administered questionnaires were used to collect the data from small business owners in 9 districts in Baghdad the capital of Iraq. The analysis was conducted using SPSS version 23.0. The direct relationship and hierarchical regre

... Show More
Scopus (12)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The impact of fear and harvesting on plankton-fish system dynamics incorporating harmful phytoplankton in the contaminated environment
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref