Preferred Language
Articles
/
joe-1635
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
A noval SVR estimation of figarch modal and forecasting for white oil data in Iraq
...Show More Authors

The purpose of this paper is to model and forecast the white oil during the period (2012-2019) using volatility GARCH-class. After showing that squared returns of white oil have a significant long memory in the volatility, the return series based on fractional GARCH models are estimated and forecasted for the mean and volatility by quasi maximum likelihood QML as a traditional method. While the competition includes machine learning approaches using Support Vector Regression (SVR). Results showed that the best appropriate model among many other models to forecast the volatility, depending on the lowest value of Akaike information criterion and Schwartz information criterion, also the parameters must be significant. In addition, the residuals

... Show More
View Publication Preview PDF
Scopus
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Proposed mechanism to activate the role of the Federal board supreme Audit in the examination of the federal budget estimates of the state
...Show More Authors

The aim of the research is to present and discuss the subject of the budgeting estimates and how to activate the role of the Federal board of supreme audit in examining these estimates through reference to Articles 6 and 10 of the Federal board of supreme Law, which did not restrict Federal board of supreme in Preventive control on examination process for planning which is prepared from the government units, as the result of a large amount  of government units Provisions and the weakness of estimates in most of its items, which rely on personal assessment and not based on scientific and logical basis of the estimate, which leads to the emergence of a deficit is not true in the general budget and this seems clear in most Iraq

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Material Requirements Planning for the Electric Motor in Fuzzy Environment for State Company for Electric Industries
...Show More Authors

ABSTRUCT

This research aims at examining the expected gap between the fact of planning and controlling process of production at the State Company for Electric Industries and implementation of material requirements planning system in fuzzy environment. Developing solutions to bridge the gap is required to provide specific mechanisms subject to the logic of fuzzy rules that will keep pace with demand for increased accuracy and reduced waiting times depending on demand forecast, investment in inventory to reduce costs to a minimum.

The proposed solutions for overcoming the research problem has required some  questions reflecting the problem with its multiple dimensions, which ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
Overlapping international positions United State and Russian Federation towards the Syrian crisis
...Show More Authors

Abstract: Due to the geopolitical importance of Syria in the Middle East region, which constitutes the captain's egg in regional and international balances, which made it a battleground, specifically after 2011 through the outbreak of the Syrian revolution and exacerbation was significantly to form an international crisis, and the emergence of intense regional competition. A broad regional polarization, the main objective of which is the uniqueness of regional leadership among the regional leaders of the region's leadership (Iran, Israel, Turkey, Saudi Arabia), It has taken a wide turn which resulted in a significant development in political events, which led to the failure of regional influential poles in the region to contain the crisi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Formal coding and its relationship to aesthetic taste among students of the Department of Art Education
...Show More Authors

The current research aims to identify pictorial coding and its relationship to the aesthetic taste of art education students. The research community consisted of (10) plastic artworks, and (3) artworks were selected as a sample for analysis and decoding. With the aim of the research, the research tool was prepared as it consisted of an analysis form, and the researcher used statistical methods: Equation (Cooper) to find the percentage of agreement between the arbitrators and the equation (Scott) to calculate the validity of the tool, and the correlation coefficient (Pearson) to extract stability in the method of segmentation half. Shape formations and achieve encryption of the plastic image through decoding symbols, meanings, and the sig

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 04 2023
Journal Name
Journal Of Indian Association Of Biomedical Scientists
“Relationship between Cathepsin K and Total oxidative state in diabetes mellitus Iraqi Women patients with osteoporosis
...Show More Authors

Introduction and Aim: Diabetes mellitus patients almost always struggle with a metabolic condition known as chronic hyperglycemia. According to the World Health Organization, osteoporosis is a progressive systemic skeletal disorder that is characterized by decreasing bone mass and microstructural breakdown of bone tissue that increases susceptibility to fracture and increased risk of breaking a bone. Here, we aimed to compare the levels of CatK and total oxidative state in patients with diabetes and osteoporosis among the female Iraqi population and study the possible relationship between them. Materials and Methods: This study included 40 females with diabetes (Group G1), 40 with diabetes and osteoporosis (Group G2) and 40 normal healthy f

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using panel data in structural equations with application
...Show More Authors

The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration.  chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Al–bahith Al–a'alami
Women’s Traits In The Iraqi Satirical Television Show ‘State Of Melon’ A Paper Extracted from A Masters Thesis
...Show More Authors

The research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Al–bahith Al–a'alami
Public relations programs and its role to enhance the morale of employees in the Ministry of Transportation: A survey study on the State land Transport Company
...Show More Authors

This research aims to learn about public relations programs and their role to enhance the morale of the State land Transport Company employees.The researcher relied on the survey method and use a questionnaire and scale tools to collect information from workers in the Department of Relations and Media and employees in all departments.
The research reached several conclusions, including:
1- Public relations seek to increase workers’ confidence in senior management and motivate them to improve their production, as well as their relentless endeavor to bring workers closer by following multiple and varied forms of communication with them.
2- The results of the study showed that there was a negative i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref