Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The yellow scale insect
Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreTo determine the potential of gingival crevicular fluid (GCF) volume, E‐cadherin and total antioxidant capacity (TAC) levels to predict the outcomes of nonsurgical periodontal therapy (NSPT) for periodontitis patients.
NSPT is the gold‐standard treatment for periodontal pockets < 6 mm in depth, however, successful outcomes are not always guaranteed due to several factors. Periodontitis‐associated tissue destruction is evidenced by the increased level of soluble E‐cadherin and reduced antioxidants in oral fluids which could be used as predictors for success/failure of N
Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreThe current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact
... Show MoreBackground: Molar Incisor hypomineralisation (MIH) is one of the biggest challenges with great clinical interest. Currently, the etiology of MIH remains unclear. There is no previous study concerning school children aged 7 – 9 years in Al-Najaf governorate in order to estimate the prevalence and severity of molar incisor hypomineralisation and the possible associated risk factors. This study aimed to estimate the prevalence, severity and the possible associated etiological factors of molar incisor hypomineralisation and also to study the correlation between body mass index and molar incisor hypomineralisation. Material and Methods: Across sectional study conducted at Al-Najaf Governorate. A total of 600 children were enrolled those
... Show MoreThe purpose of this paper is to identify environmental awareness under the Corona pandemic among students of the Faculty of Physical Education and Sports Sciences at the University of Kufa. and comparison of environmental awareness under the Corona pandemic between students of the Faculty of Physical Education and Sports Sciences at the University of Kufa. The two researchers used the descriptive approach in the style of the survey and comparisons to identify the research community in the students of the College of Physical Education and Sports Sciences at the University of Kufa for the academic year 2020-2021, who numbered (210) students, then a sample of (80) students was chosen randomly, with a percentage of (38.09%) from the research co
... Show MoreNew series of 4, 4'-((2-(Aryl)-1H-benzo [d] imidazole-1, 3 (2H)-diyl) bis (methylene)) Diphenol (3a-g) was successfully synthesized from cyclization of the reduction product of bis Schiff bases (2) with aryl aldehydes bearing phenolic hydroxyl in the presence of acetic acid. The structure of these compounds was identified from FT-IR, 1H NMR, 13C NMR and EIMs. The Antioxidant capability was screened by DPPH and FRAP assays. Both assays showed antioxidant capability more than BHT as well. Compounds 3b and 3c showed antioxidant capacity slightly less than ascorbic acid. The docking study for theses compound was carried out as III DNA polymerase inhibitor. The results of docking demonstrated that the increase in hinderances around phenolic hydr
... Show MoreIn this work, two groups of nanocomposite material, was prepared from unsaturated polyester resin (UPE), they were prepared by hand lay-up method. The first group was consisting of (UPE) reinforced with individually (ZrO2) nanoparticles with particle size (47.23nm). The second group consists of (UPE) reinforced with hybrid nanoparticles consisting of zirconium oxide and yttrium oxide (70% ZrO2 + 30% Y2O3) with particles size (83.98nm). This study includes the effect of selected volume fraction (0.5%, 1%, 1.5%, 2%, 2.5%, 3%) for both reinforcement nano materials. Experimental investigation was carried out by analyzing the thermo-physical properties like thermal conductivity, thermal diffusivity and specific heat for the polymeric composit
... Show MoreWe have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.
The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F
... Show More