Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة طرائق تقدير معلمات توزيع كاما ذي المعلمتين في حالة البيانات المفقودة باستخدام المحاكاة
...Show More Authors

The estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أهمية ودور و ملائمة البيانات المحاسبية في صنع و اتخاذ و ترشيد القرارات الادارية
...Show More Authors

    

View Publication Preview PDF
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 24 2018
Journal Name
International Journal Of Engineering Technologies And Management Research
MODELING CITY PULSATION VIA MOBILE DATA
...Show More Authors

In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for

... Show More
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Multilayer Perceptron for analyzing satellite data
...Show More Authors

Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach

View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Indirect Spectrofluorometric Method for the Determination of Cefotaxime Sodium, Ciprofloxacin Hydrochloride and Famotidine in Pharmaceuticals Using Bromate-Bromide and Acriflavine Dye
...Show More Authors

An Indirect simple sensitive and applicable spectrofluorometric method has been developed for the determination of Cefotaxime Sodium (CEF), ciprofloxacin Hydrochloride (CIP) and Famotidine (FAM) using reaction system bromate-bromide and acriflavine (AF) as fluorescent dye. The method is based on the oxidation of drugs with known excess bromate-bromide mixture in acidic medium and subsequent determination of unreacted oxidant by quenching fluorescence of AF. Fluorescence intensity of residual AF was measured at 528 nm after excitation at 402 nm. The fluorescence-concentration plots were rectilinear over the ranges 0.1-3.0, 0.05-2.6 and 0.1-3.8 µg ml-1 with lower detection limits of 0.013, 0.018 and 0.021 µg ml-1 an

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Upstream Oil And Gas Technology
Integrated approach for non-Darcy flow in hydraulic fractures considering different fracture geometries and reservoir characteristics
...Show More Authors

Scopus (3)
Crossref (3)
Scopus Clarivate Crossref