Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
A gantry robot is one of the most common types of industrial robots with linear movement. This type of robot is also known as a Cartesian or linear robot. It is an automated industrial system that moves along linear paths, enabling it to create a 3D envelope of the space in which it operates. A robot of this type has a standardised configuration process because it can have several sets of axes, such as X, Y and Z. The gantry robot picks up products from several places, so it can search through various locations. Afterwards, it carefully deposits the products on a conveyor belt for the next stage of the procedure or final shipment. This integration enables continuous and automated material flow
... Show MoreIn this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreAbstract:
Typological analysis about the negation marker in different languages is one of the fields of research that has attracted much attention. In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse different aspects of negation marker in the adjectives, the noun phrases and the verb phrases based on typological analysis. Many studies have been revealed that the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/ has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /n
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show MoreThe exercise of citizenship behaviors and their impact on customer loyalty (An analytical study from the perspective of workers in the National Insurance Company).
The Research aims to find out the degree of customers National Insurance company for customer citizenship behavior and its impact on the level oh loyalty from the perspective of employess in the company, as well as the statement of the differences in the answers of employees according to their personality traits. To achieve the goals of research has been the use of the questionnaire as a tool for the collection and distribution of data on a sample of (90) individuals, as was the use of statistical program (SPSS) in the process of statistical analysis methods (mean, sta
... Show MoreThe aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show MoreIlliteracy has spread in the last years, although it was eliminated in the 1980s. The return of illiteracy brings ignorance, illness, backwardness and regression among nations. It has taken many types, mainly alphabetical, scientific and computer illiteracy. Hence, the increasing nature of illiteracy has attracted the attention of governments and societies alike. This may touch the reality of societies starting with their youth unless those, who are in charge, will find workable solutions for the existing problems. The results of the study revealed that there is a real disaster awaiting the next generation after years of stray, and ignorance of the people in charge who are too engaged in getting their privileges to care about this proble
... Show MoreInternational trade in services is becoming increasingly important as it is an economic activity that deals with invisible trade, which has become increasingly important in the balance of international trade. The establishment of the WTO is a starting point in international trade relations. It is responsible for all aspects of international trade, , And in view of the continued increase in international trade in services, the need for more internationally recognized rules has become more urgent, especially as it has been increasingly proven that the traditional framework of public services is inadequate to operate some of the most dynamic and innovative sectors of the economy. (GATS) to be the regulatory framework for this sector
... Show MoreThe present study aims at finding out the (effect of the Caroll’s pattern on the second intermediate class pupils' achievement in geography)
The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (74) female pupils. The sample is divided into two groups (38) experimental group and (36) control one. The sample is selected from first intermediate class pupils ( Am Salama Secondary School for girls) \ Baghdad\ Al-karkh-1, for academic year 2015-2016.
The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scor
... Show More