Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
This paper presents the design and analysis of composite right left hand (CRLH) electromagnetic bandgap (EBG) structure. The proposed unit cell is consistent of a dielectric substrate with dimensions of 5×5×1 mm 3 made of FR4-Epoxy with εr = 4.4 underneath of a conductive patch with dimensions of 4.4×4.4mm 2 . The unit cell is structured to perform a negative permittivity (ε) and negative permeability (µ) in different bands. The proposed unit cell is developed to 5G systems in the sub-6GHz bands. In this work, a complete analysis of the unit cell in terms of Sparameters, constitutive parameters and refraction index are evaluated using HFSS simulation package based on Finite Element Method (FEM).
Professional learning societies (PLS) are a systematic method for improving teaching and learning performance through designing and building professional learning societies. This leads to overcoming a culture of isolation and fragmenting the work of educational supervisors. Many studies show that constructing and developing strong professional learning societies - focused on improving education, curriculum and evaluation will lead to increased cooperation and participation of educational supervisors and teachers, as well as increases the application of effective educational practices in the classroom.
The roles of the educational supervisor to ensure the best and optimal implementation and activation of professional learning soci
... Show MoreExpansive soils are recognized by their swelling potential upon wetting due to the existence of some clay minerals such as montmorillonite. An effective solution was found to avoid the danger of such soils by using piles. A single pile embedded in an elasto-plastic expansive soil has been analyzed by using one of the available software which is ABAQUS to investigate the effect of applied loads on pile’s top and investigate the effect of swelling soils on load carrying capacity of the pile. The result shows that as the pile is axially loaded at its top, the axial force along the pile gradually changes from (tension) to (compression) and the pile tends to move downward. The applied load needed to initiate pile’s settlement depend
... Show MoreInterest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza
Objectives: The aim of the study is to evaluate the information of caregivers concerned emergency care for the elderly and to identify the relationship between caregiver information and their educational level, years of service and training courses. Methodology: A quasi-experimental study was conducted in the Geriatric Care Home in Baghdad City (the governmental and private geriatric care home ) for the period from October, 14th , 2018 to March, 20th , 2019 to find the effectiveness of the instructional program on caregivers knowledge about emergency care for the elderly.. A purposive sample (non-probability) was consisting of (30) males and females caregivers, the sample was selected from geriatric care home in Baghdad city .To implemen
... Show MoreThis study aimed to show the extent of compliance with the income taxpayer to provide tax returns and increase the speed of collection of these taxes in addition to increasing confidence in Income Tax department and reduce the number of cases transferred to the courts and promote taxpayer awareness in charge of the importance of system self-assessment, and study sought to investigate the effect of the existence of records documents, technical audit, and computational audit and documentary audit on income tax collections in Jordan, from the point of view of Jordanian income tax auditors ,results shows there's a strong relation between these variables and Income Tax collections.
In this paper, the dynamics of scavenger species predation of both susceptible and infected prey at different rates with prey refuge is mathematically proposed and studied. It is supposed that the disease was spread by direct contact between susceptible prey with infected prey described by Holling type-II infection function. The existence, uniqueness, and boundedness of the solution are investigated. The stability constraints of all equilibrium points are determined. In addition to establishing some sufficient conditions for global stability of them by using suitable Lyapunov functions. Finally, these theoretical results are shown and verified with numerical simulations.