Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.
The twelve samples of agricultural soils from four regions in Al-Najaf governorate with sampling plant with soil. Physical properties of the soil where studied, such as electrical conductivity ranged from (136.33-1070.00)μS/cm-3, and moisture which ranged between the values (0.39-36.48)%. The chemical analysis of the soil have included the proportion of calcium carbonate the ratio between (44.00-48.00%) has been observed increasing amounts of calcium carbonate in surface models. The pH where results indicate that pH values were close to study models ranged between (6.88-7.42) these values generally within the normal range for the measured pH values of the Iraqi soil. The amount of gypsum ranged betwe
... Show MoreDue to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es
Municipal solid waste generation in Babylon Governorate is often affected by changes in lifestyles, population growth, social and cultural habits and improved economic conditions. This effect will make it difficult to plan and draw up future plans for solid waste management.In this study, municipal solid waste was divided into residential and commercial solid wastes. Residential solid wastes were represented by household wastes, while commercial solid wastes included commercial, institutional and municipal services wastes.For residential solid wastes, the relational stratified random sampling was implemented, that is the total population should be divided into clusters (socio-income level), a random sample was taken in e
... Show MoreSchiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an
... Show MoreThis study aims to examine the sources of organizational power prevailing among the academic leaders at the University of Tabuk from the faculty members’ viewpoint. The purposes behind such an aim are: to reveal the level of administrative and technical institutional creativity, the nature of the relationship between the reality of organizational power and the level of institutional creativity, and to disclose statistically the significant differences between the averages of faculty members’ responses attributed to the demographic variables (gender, years of experience, academic degree). The study used the descriptive approach, both survey and correlational. A questionnaire was used to collect data from a simple random sample o
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show More
ملخص البحث:
ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.
اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل
... Show MoreThis study aims to identify the degree of Arabic language teachers at the secondary stage possessing the teaching competencies necessary to develop the skills of literary savor among their students from the perception of educational leaders in Bisha Province. To achieve the objectives of the study, the descriptive approach was used by adopting a comprehensive survey method. The study sample consisted of (48) school principals and Arabic language supervisors in Bisha Province who supervise the teaching of Arabic language at the secondary level in Bisha Province. The necessary data was collected using a questionnaire. The results of the study revealed that the evaluation of the study sample for the degree to which Arabic language teachers
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
This research deals with a shrinking method concerned with the principal components similar to that one which used in the multiple regression “Least Absolute Shrinkage and Selection: LASS”. The goal here is to make an uncorrelated linear combinations from only a subset of explanatory variables that may have a multicollinearity problem instead taking the whole number say, (K) of them. This shrinkage will force some coefficients to equal zero, after making some restriction on them by some "tuning parameter" say, (t) which balances the bias and variance amount from side, and doesn't exceed the acceptable percent explained variance of these components. This had been shown by MSE criterion in the regression case and the percent explained
... Show More