Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreMeasuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Acid dissociation constants of some Schiff bases derived from 4, 6-dimethyl 2-amino pyrimidine of the type (1) in 50% V/V dioxane-water mixture in 0.003M KCl, at three different temperatures were determined potentiometrically. The thermodynamic energies were calculated and a good linear correlation was obtained between pKa and IR OH. Stretching frequencies.
The aim of the research is to identify the trends of Saudi society towards visiting art galleries and museums in light of economic and social transformations after the implementation of the 2030 vision plans. The importance of the research is to track the reasons behind the reluctance of members of society to visit such cultural institutions, and to plan proposals and recommendations for how to attract members of society and motivate them. This research followed the descriptive approach, and the study sample reached 103 members of the Saudi community. several research tools were used in this research such as questionnaire, personal interviews in addition to the researcher notes. The results concluded that the art galleries attract the ap
... Show More2-benzamide benzothiazole complexes of Pd(II) , Pt(IV) and Au(III) ions were prepared by microwave assisted radiation. The ligand and the complexes were isolated and characterized in solid state by using FT-IR, UV-Vis spectroscopy, flame atomic absorption, elemental analysis CHNS , magnetic susceptibility measurements , melting points and conductivity measurements. The nature of complexes in liquid state was studied by following the molar ratio method which gave results approximately identical to those obtained from isolated solid state; also, stability constant of the prepared complexes were studied and found that they were stable in molar ratio 1:1.The complexes have a sequar planner geometry except Pt(IV) complex has octahedral .
... Show More