Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The integration of gender in urban studies is considered a goal and objective to build a society characterized by justice and equality. It further allows all its residents to enjoy the opportunities to live in a safe urban life. Based on the that, the limitations of the research and its field of interest related to the relationship between gender and urban studies have become clear. The insufficient knowledge in this regard considers gender as a concept that does not exist in itself, but rather overlaps and intersects with several concepts and studies, including urban studies. Thus, it has become necessary to adopt a descriptive methodology that helps reach a theoretical framework to explain the beginnings of such an interaction and inte
... Show MoreBackground: Parotid gland tumors account for 80% of all salivary gland neoplasms, 20% of these are malignant, but in daily clinical practice most parotid masses are operated on before obtaining the final histological diagnosis. This clinical setting further complicates the critical point of parotid surgery, which is the management of the facial nerve. Materials and methods: 45 patients underwent parotidectomy for benign and malignant neoplasms. A complete history is collected from the patients with the duration and the site of the tumor, the facial nerve examined and its associations, a medical consultation done for opinion and management. Clinical examination with facial nerve was mandatory to avoid any mistakes that may occur. The most si
... Show MoreIraq is one of the most important countries in the world that has received its share of terrorist acts by the terrorist organization the Islamic State of Iraq and al-Sham (ISIS), which has caused instability, especially during the period of ISIS's control of seven Iraqi provinces (2014-2017). This stage has caused a decline in the levels of human and economic development and its inconsistency with the capabilities and needs of the Iraqi population. Therefore, this study aims to investigate the hypothesis that there is a close relationship between the decline in development in Iraq and the brutal practices of ISIS that it committed during his period of control over many Iraqi cities and regions. This study used several method
... Show MoreTwitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show MoreIn the recent decade, injection of nanoparticles (NPs) into underground formation as liquid nanodispersions has been suggested as a smart alternative for conventional methods in tertiary oil recovery projects from mature oil reservoirs. Such reservoirs, however, are strong candidates for carbon geo-sequestration (CGS) projects, and the presence of nanoparticles (NPs) after nanofluid-flooding can add more complexity to carbon geo-storage projects. Despite studies investigating CO2 injection and nanofluid-flooding for EOR projects, no information was reported about the potential synergistic effects of CO2 and NPs on enhanced oil recovery (EOR) and CGS concerning the interfacial tension (γ) of CO2-oil system. This study thus extensively inves
... Show MoreCarbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h
... Show MoreThe study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,
... Show More