Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o
The research focuses on the withdrawal of the United States from the nuclear agreement signed between the permanent members of the United Nations Security Council and the Islamic Republic of Iran concerning its nuclear program. This withdrawal has caused disruption in the official media discourse of the concerned countries. Therefore, the main question can be posed: Are there differences in the positions of countries related to the nuclear agreement, as well as those countries affected by it, before and after the official withdrawal of the United States on May 8, 2018?
The research aims to shed light on the trends in media discourse of the countries that signed the nuclear agreement and those affected by it b
Background: Radial neck fractures in children account for 5 to 10% of all elbow fractures in children. They are extra-articular fractures of the radius proximal to the bicipital tuberosity. The physis is typically involved as a Salter-Harris I or II pattern. Alternatively, the fracture sometimes is extraphyseal, through the metaphysis. In children there is considerable potential for remodeling after these fractures. Up to 30° of radial head tilt and up to 3 mm of transverse displacement are acceptable. Many modalities of treatment are available regarding Surgical &Non-Surgical treatments. Objectives: To evaluate the functional outcome after surgical percutaneous joystick reduction therapy of severely angulated radial neck fracture i
... Show MoreBackground: The treatment of an ovarian cyst relies on its nature, the discrimination of benign and malignant cysts is, therefore of crucial importance, and in spite of the continuous improvement of diagnostic means, it remains sometimes impossible to differentiate functional from organic (malignant or not) ovarian cysts. The therapeutic decision will search for the main midway between cancer’s negligence and the fear of performing an unnecessary surgical operation for an ovarian cyst.Objective: To review of 116 cases of ovarian cystic diseases aiming in identify proper management and reducing unnecessary surgical intervention.Methods: A retrospective study was conducted at Al-Elwiya maternity teaching hospital/ Baghdad/ Iraq. One hund
... Show MoreAbstract
Lack of safe available non-resistant treatment for visceral leishmaniasis (Kala-azar) keeps limiting the complete cure of this disease ,drugs that have toxic side effects or lack of effectiveness have led to disease relapse ,all these factors have lightened the way to the search for imperative drugs from natural resources that have been shown to have antileishmanial activity through literature survey
. In the present study, the comparative in vitro anti-leishmania activity of various fractions of Osteospermum ecklonis aerial parts fractions have been evaluated. Extracts were prepared through maceration and Soxhlet apparatus using 85% meth
... Show MoreSurgical site infections are the second most common type of adverse events occurring in hospitalized patients. Surgical antibiotic prophylaxis refers to the use of preoperative and postoperative antibiotics to decrease the incidence of postoperative wound infections. The objective of this study was to evaluate the antibiotic administration pattern for surgical antibiotic prophylaxis and the adherence to American Society of Health-System Pharmacists surgical antibiotic prophylaxis guideline in Medical City Teaching Hospitals/Baghdad. The medical records of one hundred patients who underwent elective surgical procedures were reviewed. Adherence to the recommendations of American society of health‑system pharmacists guideline was ass
... Show More