Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Single Point Incremental Forming (SPIF) is a forming technique of sheet material based on layered manufacturing principles. The sheet part is locally deformed through horizontal slices. The moving locus of forming tool (called as toolpath) in these slices constructed to the finished part was performed by the CNC technology. The toolpath was created directly from CAD model of final product. The forming tool is a Ball-end forming tool, which was moved along the toolpath while the edges of sheet material were clamped rigidly on fixture.
This paper presented an investigation study of thinning distribution of a conical shapes carried out by incremental forming and the validation of finite element method to evaluate the limits of the p
... Show Moreالمقدمة
تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.
وعموماً فإن لعملية التسعير م
... Show MoreBackground: Job satisfaction remains as an important concern for both employer and employee. A high-quality teaching staff is the cornerstone of a successful educational system. One step in developing a high quality faculty understands the factors associated with teaching quality and retention. One of these factors is job satisfaction, which has been studied widely by organizational researchers.Objectives: To evaluate the extent of job satisfaction of teaching staff working at AL-Kindy College of medicine and to identify some work-related factors associated with job satisfaction.Methods: A cross- sectional study was carried out. A convenient sample of 50 teaching staff, who had a teaching job at different scientific departments at AL-Kin
... Show MoreThe process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show Morehe current research aims at showing the correlation and effect of the internal environment analysis in the quality of health service in AL_Elwiya Maternity Teaching Hospital, researcher depended on the integral method in the "analytical descriptive method" for the study of the relation between the main variables and the sub-variables throughout data collection required by the theme of this study, a case study" in tackling the data and information related to the financial aspects of the internal environment.
The problem of the study was manifested in the essential question, that is (is there internal struc
... Show MoreIn this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.
Objective: To assess the clinical learning environment and clinical training for students' in maternal and child
health nursing.
Methodology: A descriptive study was conducted on non probability sample (purposive) of (175) students' in
Nursing College/ University of Baghdad for the period of June 19th to July 18th 2013. A questionnaire was used as a
tool of data collection to fulfill with objective of the study and consisted of three parts, including demographic,
clinical learning environment and clinical training for students' in maternal and child health nursing. Descriptive
statistical analyses were used to analyze the data.
Results: The results of the study revealed that the 65.1% of student at age which ranged b
The problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a
The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables