Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
IFRS 17 aims to provide a unified basis for accounting for all types of insurance contracts, including reinsurance contracts, in a manner that benefits both investors and insurance companies and enhances the ability of the financial statements of insurance companies for comparison between companies listed in financial markets around the world. According to this standard, insurance contracts are accounted for on the basis of the Asset-Liability Approach and the use of fair values that the standard requires updating regularly in order to provide more useful information to the users of financial statements, as a result of the failure of reporting requirements for insurance contr
... Show MoreCentral and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
Research Objectives: The research aims to highlight the approach of Imam Al-Qaradawi in contemporary jurisprudence in the recent issues of the jurisprudence of minorities, and mentioning the foundations of jurisprudence of minorities, along with some of the practical applications of Imam Al-Qaradawi.
Study Methodology: The researcher applied the inductive, analytical and comparative approach by tracking the scientific material related to the subject of the study from the books of Al-Qaradawi in the first place, then by comparing the legal provisions with what had been stated in the four schools of jurisprudence.
Findings: The interest and need of Muslim minorities in non-
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show Moreالمستخلص
يهدف البحث إلى وضع إطار معرفي ومفاهيمي شامل لموضوع البحث, واغناء القارئ والمستفيد بالمعلومات الوافية عنه وتقليص الفجوات المعرفية للمهتمين به وقياس مدى ما هو متوفر وغير متوفر من المتطلبات الأساسية والضرورية لإنشاء صناديق التحوط في البيئة العراقية, وتمثلت صناديق التحوط بالمتغير الرئيس للبحث اما المتغيرات الفرعية فشملت (المتطلبات المالية, المتطلبات البشرية, البيئة التشريعية, الب
... Show MoreThis study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreThe research aims to show the possibility of adopting the market approach to measure the fair value of biological assets in Iraq, by applying to a sample of the company listed on the Iraq Stock Exchange, where the Middle East Fish Production and Marketing Company was selected from among 7 companies representing the agricultural sector in Iraq, and according to the availability of data and for five years, the financial statements were presented of the measurement and disclosure of biological assets at fair value according to the market approach, One of the most important conclusions reached by the researcher is the The possibility of measuring and disclosing biological assets at fair value according to the market approach in the Ira
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More