Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreThe current research deals with the specificity of the interior design of the classes of art education in the schools of excellence for the province of Muthanna and its center of the city of Samawah. In the first chapter، the problem of research was determined by the lack of internal spaces of the classes of art education to designs that meet the requirements and needs of students in these educational stages. The importance of the research in being an addition to knowledge in the field of interior design and engineering department of the general directorates of the Ministry of Education. The objectives of the research were determined through.
- Identifying the reality of the halls of art education for sch
This study presents a practical method for solving fractional order delay variational problems. The fractional derivative is given in the Caputo sense. The suggested approach is based on the Laplace transform and the shifted Legendre polynomials by approximating the candidate function by the shifted Legendre series with unknown coefficients yet to be determined. The proposed method converts the fractional order delay variational problem into a set of (n + 1) algebraic equations, where the solution to the resultant equation provides us the unknown coefficients of the terminated series that have been utilized to approximate the solution to the considered variational problem. Illustrative examples are given to show that the recommended appro
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
A fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. Th
... Show MoreThis research sought to detect the level of organizational culture prevailing in the Integrity Commission as well as the level of the organizational citizenship behavior of staff of the Commission and the impact of organizational culture in these behaviors. To achieve the objectives of the research and test the validity of hypotheses have been used questionnaire derived from measurements ready modern researchers foreigners have been adapted to suit the Iraqi environment, have been distributed (189) questionnaire on the number of employees from the Integrity Commission, which represented the research sample where the research community has a number is (1365) employees in the Baghdad was the use of a number of statistical met
... Show More