Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Al–bahith Al–a'alami
The Arts of Media Writing / An Empirical Study on the Privacy of Media Writing
...Show More Authors

Media writing is accuracy writing. Clarity and concision are its predominant features. It is a writing that goes straight to the essence because it has no time to waste. Furthermore, it must be as accurate as scientific writing. It is destined for the average reader and has to be understood by everyone. However, it can be as elegant as literary writing. The variety in its forms of expression does not prevent media writing from having its own amplitude.

In short, this study is a practical approach that aims at studying different kinds of writing styles and identifying the specificity of media writing using some patterns and examples

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Sharing knowledge on organizational innovation Field study in the arab company , for detergents and chemical
...Show More Authors

ABSTRACT

Impkact  of  Knowledge  sharing  on  organizational  innovation  Impriscal  study in Arabic company . 

of  Knowledge Management is  the  main  component  Knowledge  sharing  system, it mean the exchange if  Knowledge, ideas, and good  practice with  another  individual . Knowledge sharing between persons, then its values can growth .

It is vry important because it can provide us with the contention between virus peoples . the interaction among the people can pass all kind of Knowledge among them. the connection and interaction and interaction enabl

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
مجلة الآداب
Vietnamese Women's Participation in the Vietnam War 1964-1975
...Show More Authors

The participation of Vietnamese women in the Vietnam War has not received the attention it deserves. This research paper, presented to the conference of the Department of History/College of Arts - University of Baghdad, held on April 25, 2024, provides a comprehensive overview of the participation of North Vietnamese women in providing military and logistical support during the years of the Vietnam-American War (1964-1975). It shows the belief of Ho Chi Minh, the leader of the Vietnamese national movement, and the Hanoi government in democratic Vietnam, in the ability of North Vietnamese women to assume many new roles that were unfamiliar to Vietnamese society, as well as the factors that led to the involvement of women in the war and the r

... Show More
Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
knowledge sharing and its role in Organizational excellence
...Show More Authors

The current research aims to diagnose the extent of interest in knowledge sharing and its role in achieving organizational excellence at the level of the Iraqi environment Primary data through descriptive statistics (arithmetic mean, standard deviation, coefficient of variation, percentages, frequencies) and hypothesis testing using appropriate statistical methods for inferential statistical analysis (Pearson correlation coefficient, simple linear regression, multiple regression, path analysis) and checking the quality of the data from During (normal distribution, confirmatory factor analysis, structural modeling method, and exploratory factor analysis), after collecting data from (358) observations from the company’s leaders, as

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
دور تنقيب البيانات Data Mining في زيادة أداء المنظمة (( دراسة تحليلية في المصرف الصناعي ))
...Show More Authors

تمهيد

غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.

ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التط

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the

... Show More
View Publication Preview PDF
Scopus (42)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Motivated Classroom Evaluation Environment for Learning and its Relationship to Feedback Patterns among Teachers of the Second Cycle of Basic Education in the Sultanate of Oman
...Show More Authors

This study aims to investigate the degree of practicing the motivated classroom evaluation environment for learning and its relationship to different feedback patterns. To achieve the objectives of the study, the correlational descriptive research design was employed. A questionnaire was constructed consisting of two parts: the classroom evaluation environment (13) items, and feedback patterns (24) items on a five-point scale. The psychometric properties of the questionnaire were verified in terms of validity and reliability. The questionnaire was applied to a sample of (265) male and female teachers who work in the second cycle schools for grades (5-10) of basic education in all academic majors in the Governorate of Muscat in the Sultan

... Show More
View Publication Preview PDF