Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (53)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Application of Data Mining Techniques on Tourist Expenses in Malaysia
...Show More Authors

Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of the service encounter environment in enhancing customer satisfaction
...Show More Authors

Because of the fierce competition between service organizations on the one hand and the increasing demands of customers on the other. Therefore, these organizations sought to distinguish their service by taking care of all aspects. One of these important aspects is the service encounter environment and its reflection on customer emotions, so we choose the current research to clarify the importance and impact on customer satisfaction, the problem of research is how the interest of Iraqi restaurants in the service encounter environment and how to care about its elements and whether this interest is sufficient to reflect the satisfaction of the customer. the goal of the current research was to clarify how much the application of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Image And Video Technology: 8th Pacific-rim Symposium
A New Scheme for QoE Management of Live Video Streaming in Cloud Environment
...Show More Authors

Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Risks of Audit under Environment of Information Technology
...Show More Authors

Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronicall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Person-Organization's Environment Fit and it's Reflection on the Work Outcomes
...Show More Authors

This study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational  citizenship behavior ).

The questionnair’e has been used as a basic  instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 07 2019
Journal Name
Journal Of Planner And Development
the role of the economy in protecting the environment from pollution and decision_making
...Show More Authors

The economic dimensions of environmental issues are complex and unclear in many cases, there is a kind of confusion in the real relationship between economic growth and environmental regulations. Many of the negative environmental impacts are accompanied by human activities and urban and industrial development in the city, and that many of the projects that did not take into account the environmental factors during the planning and implementation of them can be detrimental, as well as natural environments, archeological sites, historical or scientific value, aesthetic or educational. It also describes the Global Environment Outlook that if current trends continue, population growth, economic growth and consumption patterns, the p

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of weighted estimated method and proposed method (BEMW) for estimation of semi-parametric model under incomplete data
...Show More Authors

Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the

... Show More
View Publication Preview PDF
Crossref