The dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthorized searches by those involved. In addition to securing inquiries, making calculations on this data, and generating differential privacy and garbled circuits, cryptography is considered one of the important solutions to this problem. This paper introduces most of the important challenges related to maintaining privacy and security and classifies each problem with appropriate, proposed, or applied solutions that will fuel researchers' future interest in developing more effective privacy-preserving methods for genomic data.
Each Arab Islamic city is distinguished by its distinctive characteristics dictated by the nature of its location and its characteristics, as we see it mountainous in the mountains, deserts in the deserts, and coastal in the coasts, and this is reflected in the models of its buildings and designs and even in its structure. However, this uniqueness did not stand in the way of the emergence of characteristics and common characteristics of these cities over time, the factors derived from the core of the life of the community habits and traditions and beliefs and living requirements and environmental conditions that all piled in the process of building and construction of the Arab Islamic city to draw The features and lines of life of the co
... Show MoreLet R be a semiprime ring with center Z(R) and U be a nonzero ideal of R. An additive mappings are called right centralizer if ( ) ( ) and ( ) ( ) holds for all . In the present paper, we introduce the concepts of generalized strong commutativity centralizers preserving and generalized strong cocommutativity preserving centralizers and we prove that R contains a nonzero central ideal if any one of the following conditions holds: (i) ( ) ( ), (ii) [ ( ) ( )] , (iii) [ ( ) ( )] [ ], (iv) ( ) ( ) , (v) ( ) ( ) , (vi) [ ( ) ( )] , (vii) ( ) ( ) ( ), (viii) ( ) ( ) for all .
As smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf
... Show MoreIn this study, we try to deviate from the traditional methods of preserving fish. The research depends on finding alternative modern methods by which fish bodies can be preserved in a better way and for long periods after conducting some laboratory treatments on the specimens to ensure obtaining clean and clear samples suitable for diagnosis and study, in addition to keeping it in a new, lightweight and elegant form that can give three-dimensional shapes to the specimens. The final specimens were of high quality and unbreakable durability with high clarity and transparency and low manufacturing costs. This study is the first of its kind.
In this study, we prove that let N be a fixed positive integer and R be a semiprime -ring with extended centroid . Suppose that additive maps such that is onto, satisfy one of the following conditions belong to Г-N- generalized strong commutativity preserving for short; (Γ-N-GSCP) on R belong to Г-N-anti-generalized strong commutativity preserving for short; (Γ-N-AGSCP) Then there exists an element and additive maps such that is of the form and when condition (i) is satisfied, and when condition (ii) is satisfied
Iraq faces significant economic challenges, owing in part to its reliance on oil revenue and the country's overburdened public sector. The supremacy of State-Owned Enterprises (SOEs), obstructive rules, a lack of access to finance, a shortage of skilled labor, and inadequate infrastructure all impede private sector growth. This research relied mainly on information from global development organizations, most markedly the World Bank, as well as policy documents, and it discovered a scarcity of pertinent educational writings. The following are the key findings of this research: Recent economic growth has not resulted in poverty reduction; the stretched history of war and insecurity in Iraq has hampered progress and development; the private se
... Show MoreIn this paper, we introduce the concept of generalized strong commutativity (Cocommutativity) preserving right centralizers on a subset of a Γ-ring. And we generalize some results of a classical ring to a gamma ring.
Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show More