Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The aim of the current research is to study a topic from the Qur’anic topics, few have researched it and realized its content, so people knew it in one name in the Qur’an in another name, and due to the ancientity of the topic and its contemporaneity, I wanted to write about it. The research has an introduction, three demands, and a conclusion with the most important results of the research:
As for the introduction: It was to indicate the importance of the topic and an optional reason for it.
As for the first requirement: it included the definition of reasoning, its divisions, and its characteristics.
As for the second requirement, it was to indicate the meaning, types, and methods of labeling it.
As for the third require
To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult
... Show MoreDuring the study the current selection seven stations in the Zab River bottom and the Tigris River took samples a month to study the signs of bacterial contamination study coliform and colon fecal Almsobhaat and Almsobhaat Bazah and the total number of bacteria and bacterial gangrene gas causing Knkeran as well as a study to isolate and diagnose some races and types of bacterial pathogens in water or intensityusing the traditional system and the system of intestinal bacteria
The e-news is one of the most important journalistic arts in new media (the Internet). The process of telling the story by the journalist is an important aspect of the communicative process between the users of the internet and the reporter. The electronic news is characterized by having text, fixed images, animations, videos and sound. All these give greater vitality to the communicative process and increase the semiotic dimensions. Also, it makes the narrative process more distinctive and embodied of the elements of the event. This research studies all these aspects and tries to show the distinction between the semiotics of narration and the electronic news.
In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreThe method of incineration was chosen to treat the most commonly used antimicrobial agents in Iraq (Triclabendazol, Oxfendazol, Mebendazole), which are antibiotics for children. The moisture content and chemical oxygen demand (COD) were examined and the results were (93.34, 94.88, 92.97)%, (52000, 33200, and 64000) mg/ L. The temperature was determined as a variable in the burning process (600, 500, 400)° C for the purpose of calculating the loss of ignition LOI and determining the ideal temperature. The results of the models (Triclabendazol, Oxfendazol, Mebendazole) (94.92, 93.12, 58.81% and 88.87), (62.61, 44.08%, 98.75, 84.98 and 55.086)% respectively. When mixing the three models in equal proportions, the percentage of loss was 92.8
... Show MoreThis study deals with establishing the depositional environment of the Fatha Formation through facies analysis. It also deals with dividing the formation into units based on the rhythmic nature. Data from selected shallow wells near Hit area and deep wells at East Baghdad Oil field are used. Five major lithofacies are recognized in this study, namely, greenish grey marl, limestone, gypsum (and/or anhydrite), halite and reddish brown mudstone (with occasional sandstone).The limestone lithofacies is divided into three microfacies: Gastropods bioclastic wackestone microfacies, Gastropods peloidal bioclastic packstone, and Foraminiferal packstone microfacies.The lithofacies of the Fatha are nested in a rhythmic pattern or what is known as sh
... Show More