Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Mersing is one of the places that have the potential for wind power development in Malaysia. Researchers often suggest it as an ideal place for generating electricity from wind power. However, before a location is chosen, several factors need to be considered. By analyzing the location ahead of time, resource waste can be avoided and maximum profitability to various parties can be realized. For this study, the focus is to identify the distribution of the wind speed of Mersing and to determine the optimal average of wind speed. This study is critical because the wind speed data for any region has its distribution. It changes daily and by season. Moreover, no determination has been made regarding selecting the average wind speed used for w
... Show MoreTremendous efforts have been exerted to understand first language acquisition to facilitate second language learning. The problem lies in the difficulty of mastering English language and adapting a theory that helps in overcoming the difficulties facing students. This study aims to apply Thomasello's theory of language mastery through usage. It assumes that adults can learn faster than children and can learn the language separately, and far from academic education. Tomasello (2003) studied the stages of language acquisition for children, and developed his theory accordingly. Some studies, such as: (Ghalebi and Sadighi, 2015, Arvidsson, 2019; Munoz, 2019; Verspoor and Hong, 2013) used this theory when examining language acquisition. Thus,
... Show MoreIn the name of of Allah the Merciful
Praise be to God, and blessings and peace be upon the Messenger of God, Muhammad, and upon his family and his family and peace, and after:
The honor of every knowledge of honor is related to it, and since the science of interpretation is related to the Book of God Almighty; it is considered one of the most noble and longest of sciences, and this science began long ago as the early ages of Islam have expanded the Islamic state, and people entered the religion of God in cohorts, and the mixture mixed In tongues, and people did not know much about the meanings of the Qur’an, so the need for authorship in this great knowledge was severe, and pe
المقدمة
تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.
وعموماً فإن لعملية التسعير م
... Show MoreObjective: To assess the clinical learning environment and clinical training for students' in maternal and child
health nursing.
Methodology: A descriptive study was conducted on non probability sample (purposive) of (175) students' in
Nursing College/ University of Baghdad for the period of June 19th to July 18th 2013. A questionnaire was used as a
tool of data collection to fulfill with objective of the study and consisted of three parts, including demographic,
clinical learning environment and clinical training for students' in maternal and child health nursing. Descriptive
statistical analyses were used to analyze the data.
Results: The results of the study revealed that the 65.1% of student at age which ranged b
he current research aims at showing the correlation and effect of the internal environment analysis in the quality of health service in AL_Elwiya Maternity Teaching Hospital, researcher depended on the integral method in the "analytical descriptive method" for the study of the relation between the main variables and the sub-variables throughout data collection required by the theme of this study, a case study" in tackling the data and information related to the financial aspects of the internal environment.
The problem of the study was manifested in the essential question, that is (is there internal struc
... Show MorePore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro
... Show MoreBuilding numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr
Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show More