Preferred Language
Articles
/
joe-1635
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (13)
Crossref (6)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Kinds of Food and Drinks in Morocco in the Period of Al-Murabteen and Al-Moahideen
...Show More Authors

Cooking was of great importance in the Islamic Arabic culture and the
people of Morocco have shown great interest in this aspect and also in the
variety in the making of food. They used all kinds of meat of and have shown
interest in preserving and distributing it .The people of Morocco used the
additives in their cooking such as salt, saffron and many other kinds to add
special flavor and taste and their cooking a distinctive flavor.
Sweet and pastry, in addition to the drinks, represented another aspect of the
Moroccan kitchen. At that time women were brought as slaves from Sudan
and as a result they brought their experience in the making of sweets and
pastry with them to Morocco, they used sugar, fat, wheat

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Dramatic Dialogue And Its Effectiveness In Enhancing The Characteristics Of The Alienated Character In The Television Series
...Show More Authors

Dialogue is one of the pillars of character building in the television series, through which it is possible to identify the most important characteristics and traits of the personality, in addition to its ability to reveal the most important problems at all levels. The following: (How does dialogue contribute to enhancing the traits of the alienated personality?). It therefore aims to identify the effectiveness of the dramatic dialogue in enhancing the traits of the alienated personality represented by (powerlessness, isolation, meaninglessness, objectification, non-standardization and rebellion). (The traits of the alienated character, and the second is the psychological function of the dramatic dialogue), to extract from them the main

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Development and democracy in the Republic of Korea study in dialectic relationship
...Show More Authors

After its 35-year occupation of Japan and the US occupation, Korea has set its sights on a long-term goal of building its country and establishing its foundations, unobtrusive and unchecked by the problems and wars that have stood in the way of its goal, surpassing all odds and achieving the best results. The most powerful Asian and global economies, which gained the respect of the world and its appreciation of the experience has become referred to as boys

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Income Tax in Iraq and the Treatment of Married Women in Charge
...Show More Authors

   Iraqi legislator taxation  married women in charge of the income tax treatment of the man in charge of tax and the application of the principle of equality of individuals to bear public burdens. The factor legislator women in charge of special treatment in some cases, taking into account the circumstances family allow  tax in the case of whether she was married to a man is unable to completely work and does not have a resource, as well as giving the legislator allow for her children. it observed that the amount of allowing still little is notcommensurate with the high cost of living in addition to limiting the tax allowances granted within the limits of the taxpayer and his immediate family did not take the legisla

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Formal and Functional Perspectives in the Analysis of Hyperboles in Obama's Speeches
...Show More Authors

     Hyperbole is an obvious and intentional exaggeration in the sense that it takes things to such an extreme that the audience goes too far and then pulls itself back to a more reasonable position, i.e. it is an extravagant statement or figure of speech not intended to be taken literally. This paper focuses on the formal and functional perspectives in the analysis of hyperbole which American candidates produce in their speeches in electoral campaigns, for it is hypothesized that candidates in their electoral campaigns use hyperbolic expressions excessively to persuade voters of the objectives of their electoral campaign programs. Hence, it aims to analyze hyperbole in context to determine the range of pragmatic func

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The views of Ibn Kisan in the tools and grammatical vocabulary in the Book of the ErtshafAlthrab of Ibn Hayyan Andalusia
...Show More Authors

The scholars differed very much in determining the grammatical doctrine of Ibn Qaysan. It was said that he confused between the two sects and took the two groups(1) and that he took from Abu Abbas the fox and Abu al-Abbas almabrd(2).He was descended from the two sheikhs almbrad and fox(3), This research to find out his grammatical opinions in the tools and grammatical words that appeared in the Book of Resonance of Multiplication to the many reported by Ibn Hayyan in it, he has seen the books of Ibn Kisan did not reach us.
The collection of these opinions and analysis is important for the scholars. Because the books of Ibn Kaysan specialized in grammar have lost their most important, the books that are similar to the book of Ibn al-Ha

... Show More
View Publication Preview PDF