Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Scientific research on the environment of the Iraqi marshes, its beauty and its characteristics is considered one of the most important functions of Iraqi universities and scientific institutions, because of its great historical impact related to the identity of Iraq and the Iraqis and the basis of science and science, through which the first letter and the first human civilizations were established and in the same importance technical research is among the most important functions of departments Institutes and colleges of the arts, research centers and museums inside and outside Iraq. Also, research centers specialized in the natural environment of Iraq, including the marshes. Therefore, it is hoped that this research will develop the a
... Show MoreAbstract
A surface fitting model is developed based on calorimeter data for two famous brands of household compressors. Correlation equations of ten coefficient polynomials were found as a function of refrigerant saturating and evaporating temperatures in range of (-35℃ to -10℃) using Matlab software for cooling capacity, power consumption, and refrigerant mass flow rate.
Additional correlations equations for these variables as a quick choice selection for a proper compressor use at ASHRAE standard that cover a range of swept volume range (2.24-11.15) cm3.
The result indicated that these surface fitting models are accurate with in ± 15% for 72 compressors model of cooling cap
... Show MoreAbstract
Objective(s): To evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status.
Methodology: A descriptive design is employed throughout the present study to evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status from November 3rd 2017 to June 30th 2018. A purposive “nonprobability” sample of (101) housekeeping staff is selected for the present study. An instrument is constructed for the purpose of the study and it is consists of (2) parts: (I) Evaluation of work environment, and (II) Evaluation of housekeeping st
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreThe peculiarity of the theater does not lie in its dramatic content because many literary genres and other artistic styles share with it in this content. The peculiarity of the theater lies in contemplating the drama through what is architectural, and this architectural axis is what distinguishes its character. It is a spatial poetry which is composed by the laws of physics and chemistry, (Weight, height, distance, rhythm, gravity, impulses and chemical excretions). i.e., what cannot be expressed in words. This is a game of space to exchange and organize energy and communicate in space by the living body, which contains the possibilities of the living drawing in space: in the time and place. This research deals with the importance of the
... Show MoreThe transfer of training process occupies a great importance in achieving the ultimate goal of participating in the training programs , it is sure that this does not take place without the support of the working environment for trainees, and The research aims to personification role the work environment characteristics of supporting the transfer of training.
The research problem is the weakness transfer of training to the work en
... Show MoreSecurity reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreAbstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More