Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
In this paper, series of new complexes of Manganese(II), Cobalt(II), Nickel (II) Cupper(II) Zinc(II), Cadmium(II) and Mercury (II) are prepared from the new ligand [2-(3-benzoylthioureido)-3-(-4- hydroxyphenyl) propanoic acid (BHP) derived from tyrosine and benzoylisothiocyanate .Chemical structures are obtained from their 1 H, 13CNMR spectra (for BHP), elemental microanalyses, molar conductance, FTIR, UV–Vis, magnetic susceptibility in addition to TGA/DTG and DSC analysis, the suggested geometry for all complexes was tetrahedral. The biological activity of BHP and its complexes has been extensively studied against two bacterial species Staphylococcus aurous (G+) and Escherichia coli (G-) by agar-well diffusion technique, where Mn(II), Co
... Show MoreThe research focuses on addressing one of the most important concepts of modern management that deal with the relationship between government institutions and stakeholders, Which now occupies a special significance in trends modern management, a concept of corporate governance it takes the internal mechanisms due to its key role and is important in the process of corporate governance and looking for building Effective mechanisms for this concept in light of laws and regulations that are available in the local environment and on the functioning of government institutions, Search has been applied in the Federal Board of Supreme Audit of Iraq (BSA) due to its particular importance as an institution control and as a awaits the societ
... Show Moreاثناء تفاعل الديزنة تكونت صبغة أزو جديدة عن طريق تفاعل 3-امينوفينول مع 2,4,6-ثلاثي هيدروكسي اسيتوفينون . ثم تم تفاعل هذا الليكاند مع بعض ايونات العناصر الكروم والحديد الروديوم والروثينيوم بتكفؤهم الثلاثي والكوبلت الثنائي والموليبدينوم سداسي التكافؤ مكونة معقدات فلزية مختلفة بأشكال هندسية متعددة. تم ملاحظة تناسق مجموعة الازو مع ايونات العناصر من خلال ملاحظة ظهور حزم امتصاص الفلز مع النتروجين والاوكسجين ب
... Show MoreIn this work, we synthesized thirteen compounds of 1-(2-furoyl)thiourea derivatives 1-13 by conversion of 2-furoyl chloride to 2-furoyl isothiocyanate by reacting it with potassium thiocyanate in dry acetone in a quite short reflux time then, in the same pot, different of (primary and secondary amines) were added individually to achieve thiourea derivatives. The products were characterized spectroscopically using (FT-IR, 1H NMR and 13C NMR) techniques. Some of them were evaluated as antioxidant agents using DPPH radical scavenging method, and all were examined theoretically as enzyme inhibitors against Bacillus pasteurii urease (pdb id: 4ubp) and by studying molecular docking using Autodock (4.2.6) software.
Some methods recommended abroad to control the oriental hornet, Vespa orientalis L., attacking the honey bee, Apis mellifera L., colonies were tested, with some modifications, for the first time under the Iraqi conditions. One of these methods was carried out by covering the hive entrance with a piece of queen excluder to prevent the hornet from entering the hive. Also, the position of hive stand was reversed to deprive the hornet from using the flight board as a stage for waiting and creeping toward the defending bees. The second method was carried out by fixing a cardboard cone as a bee passage at the hive entrance to hinder the entry of the hornet into the hive. Both of these methods were found to be unsuccessful to
... Show MoreBackground: This study evaluate the immunohistochemical expression profile of transforming growth factor beta-1 in inflamed gingival tissue of patients with gingivitis and chronic periodontitis compared to healthy subjects and, determine the correlation between this cytokine and the clinical periodontal parameters, intensity of inflammation and chronic periodontitis severity. Materials and methods: Gingival tissue specimens were taken from 23 chronic periodontitis patients, 20 gingivitis patients and 20 periodontally healthy subjects. The periodontal status was evaluated by dichotomous measurements of the clinical periodontal parameters (PLI, GI, BOP, PPD, CAL). The gingival specimens were fixed immediately in 10% formalin and processed ro
... Show More