Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.
The main purpose of the work is to apply a new method, so-called LTAM, which couples the Tamimi and Ansari iterative method (TAM) with the Laplace transform (LT). This method involves solving a problem of non-fatal disease spread in a society that is assumed to have a fixed size during the epidemic period. We apply the method to give an approximate analytic solution to the nonlinear system of the intended model. Moreover, the absolute error resulting from the numerical solutions and the ten iterations of LTAM approximations of the epidemic model, along with the maximum error remainder, were calculated by using MATHEMATICA® 11.3 program to illustrate the effectiveness of the method.
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreThe research aims to present a proposed strategy for the North Oil Company, and the proposed strategy took into account the surrounding environmental conditions and adopted in its formulation on the basis and scientific steps that are comprehensive and realistic, as it covered the main activities of the company (production and exploration activities, refining and refining activities, export and transport of oil, research and development activity, financial activity, information technology, human resources) and the (David) model has been adopted in the environmental analysis of the factors that have been diagnosed according to a
... Show MoreA computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values
... Show MoreIn this paper, we suggest a descent modification of the conjugate gradient method which converges globally provided that the exact minimization condition is satisfied. Preliminary numerical experiments on some benchmark problems show that the method is efficient and promising.
... Show MoreLow oil extraction and early high water production are caused in part by reservoir heterogeneity. Huge quantities of water production are prevalent issues that happen in older reservoirs. Polyacrylamide polymer gel systems have been frequently employed as plugging agents in heterogeneous reservoirs to regulate water output and increase sweep efficiency. Polyacrylamide polymer gel systems are classified into three classes depending on their composition and application conditions, which are in-situ monomer gel, in-situ polymer gel, and preformed particle gel (PPG).
This paper gives a comprehensive review of PPG’s status, preparation, and mechanisms. Many sorts of PPGs are categorized, for example, millimeter-sized preformed p
... Show MoreObjective: To review and identify the major drivers for COVID-19 vaccine acceptance. Methods: A scoping review of studies of COVID-19 vaccine perceptions and barriers to using the COVID-19 vaccines. Two search engines, including PubMed and Google Scholar, were purposefully searched. Results: Eight studies from different countries were reviewed to categorize factors influencing people's acceptance of COVID-19 according to the Health Belief Model (HBM). Perceived susceptibility, and severity of the disease (COVID-19), in addition to perceived benefits of COVID-19 vaccination and "cues to action", can enhance vaccination acceptance. In contrast, perceived barriers to the COVID-19 vaccine can increase people's hesitancy to be vaccinated
... Show More