Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
he current research aims at showing the correlation and effect of the internal environment analysis in the quality of health service in AL_Elwiya Maternity Teaching Hospital, researcher depended on the integral method in the "analytical descriptive method" for the study of the relation between the main variables and the sub-variables throughout data collection required by the theme of this study, a case study" in tackling the data and information related to the financial aspects of the internal environment.
The problem of the study was manifested in the essential question, that is (is there internal struc
... Show MoreIn this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.
The problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a
Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
This research included important results, th
The problem with research lies in hiding the Hanbali approach in building long and short travel provisions, as well as hiding some provisions relating to short travel that are not provided for by the jurists of Hanbali (in their books).
The research aims to demonstrate the approach and standards on which they based the long and short travel provisions, as well as to reflect the provisions of some of the issues that are silent on long and short travel, with evidence and significance.
The research included a preface and two researches, the researcher in the preface talked about the reality of long and short travel, in the first research on the approach of ha
... Show MoreThe study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,
... Show MoreCarbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h
... Show MoreThis study sought to investigate the impacts of big data, artificial intelligence (AI), and business intelligence (BI) on Firms' e-learning and business performance at Jordanian telecommunications industry. After the samples were checked, a total of 269 were collected. All of the information gathered throughout the investigation was analyzed using the PLS software. The results show a network of interconnections can improve both e-learning and corporate effectiveness. This research concluded that the integration of big data, AI, and BI has a positive impact on e-learning infrastructure development and organizational efficiency. The findings indicate that big data has a positive and direct impact on business performance, including Big
... Show MoreThe surface finish of the machining part is the mostly important characteristics of products quality and its indispensable customers’ requirement. Taguchi robust parameters designs for optimizing for surface finish in turning of 7025 AL-Alloy using carbide cutting tool has been utilized in this paper. Three machining variables namely; the machining speeds (1600, 1900, and 2200) rpm, depth of cut (0.25, 0.50, 0.75) mm and the feed rates (0.12, 0.18, 0.24) mm/min utilized in the experiments. The other variables were considered as constants. The mean surface finish was utilized as a measuring of surface quality. The results clarified that increasing the speeds reduce the surface roughness, while it rises with increasing the depths and fee
... Show More