Preferred Language
Articles
/
joe-1635
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The International Conference On Research Advances In Engineering And Technology - Itechcet 2022
Suitability of Iraqi legal system for building operation transfer contract in infrastructure construction projects
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Techniques of Acting Performance in Fantasy Theatrical Show: راسل كاظم عوده-ليلى فؤاد فاضل
...Show More Authors

     This research deals with the fact that arts exit from their familiar context in practice and enter in the context of the fantasy and exoticism picture. In order to understand the theatrical phenomenon and know the way of its production of the fantasy picture, especially the acting performance in its transitions between the real and fantasy. This study consists of: an introduction of the research in which the researcher presented the research problem, importance and objectives.  

    The theoretical framework dealt with founding a theoretical part for the research consisting of two sections: the first (fantasy: the concept and the working) and the second (techniques of acting perfo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
In vitro assessment of bracket adhesion post enamel conditioning with a novel etchant paste
...Show More Authors

Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket ‎adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a ‎‎simplified capsule ‎formula that can underpin clinically ‎adequate bracket bond strength ‎without jeopardizing the ‎integrity of enamel upon ‎the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare ‎experimental acidic CaP paste. Sixty human premolars were ‎assigned into two groups of 30 each. ‎Enamel conditioning was accomplished using 37% PA-gel‎ for control group and CaP paste for e

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Drug Design, Development And Therapy
Prophylactic effects of Clausena excavata Burum. f. leaf extract in ethanol-induced gastric ulcers
...Show More Authors

View Publication
Scopus (45)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Existence of Fixed Points for Expansive Mappings in Complete Strong Altering JS-metric space
...Show More Authors

The paper aims at initiating and exploring the concept of extended metric known as the Strong Altering JS-metric, a stronger version of the Altering JS-metric. The interrelation of Strong Altering JS-metric with the b-metric and dislocated metric has been analyzed and some examples have been provided. Certain theorems on fixed points for expansive self-mappings in the setting of complete Strong Altering JS-metric space have also been discussed.

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
VALUE CHAIN ANALYZE OF DAIRY PRODUCTS IN IRAQ CASE STUDY: ABU GHRAIB DAIRY ( FACTORIES)
...Show More Authors

ABSTRACT
                  The research aims to analyze the value chain of dairy products in Iraq (Abu Ghraib/Study Case) factories for the year 2022, where value chain rings are identified to discuss and track the most important determinants and problems in the value chain rings of dairy products and their basic and secondary activities, as well as calculate the value added of the products by subtracting the total revenues of products from their variable costs. Research data were collected for the period 2022. Preliminary information and data from its field sources and personal interviews were collected through a questionnaire prepa

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Caspian Journal Of Environmental Sciences
DNA-damage in blood of welders occupationally exposed to welding fume using comet assay
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Nov 30 2019
Journal Name
Journal Of Engineering And Applied Sciences
Distribution of Land Surface Temperatures from Satellite Images for Al-Hammar Marshes In Iraq
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Ecology
Horizontal variability of some soil properties in wasit governorate by using time series analysis
...Show More Authors

Scopus (2)
Scopus