Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Background Commonly heard statements such as “Christmas comes around more quickly each year” suggest that the passage of time between annual events can become distorted, leading to the sensation of time passing more quickly than normal. At present however, it is unclear how prevalent such beliefs are and, what factors are predictive of it. Aim To explore the prevalence of beliefs that annual events such as Christmas (Study 1 UK sample) and Ramadan (Study 2 Iraqi sample) feel like they come around more quickly each year. To establish the association between distortions to the passage of time between annual events and emotional wellbeing, event specific enjoyment, memory function and self-reported attention to time. Methods Participants c
... Show MoreOxazepine [1] is non – nomologous seven –member ring that contain two netroatoms (oxygen and nitrogen ). Meanwhile diazepine [2] contains to nitrogen atoms in seven – member ring.
Diazepam (valium) [3] is used to relive anxiety tension associated with anxiety disorder and muscle spasms (1, 2, 3
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreA new Schiff base [1-((2-(1H-indol-3-yl)ethylimino)methyl)naphthalene-2-ol] (HL) has been synthesized by condensing (2-hydroxy-1-naphthaldehyde) with (2-(1H-indol-3-yl)ethylamine). In turn, its transition metal complexes were prepared having the general formula; [Pt(IV)Cl2(L)2], [Re(V)Cl2(L)2]Cl and [Pd(L)2], 2K[M(II)Cl2(L)2] where M(II) = Co, Ni, Cu] are reported. Ligand as well as metal complexes are characterized by spectroscopic techniques such as FT-IR, UV-visible, 13C & 1H NMR, mass, elemental analysis. The results suggested that the ligand behaves like a bidentate ligand for all the synthesized complexes. On the other hand, theoretical studies of the ligand as well its metal complexes were conducted at gas phase using Hyp
... Show MoreExcessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreThe research focuses on addressing one of the most important concepts of modern management that deal with the relationship between government institutions and stakeholders, Which now occupies a special significance in trends modern management, a concept of corporate governance it takes the internal mechanisms due to its key role and is important in the process of corporate governance and looking for building Effective mechanisms for this concept in light of laws and regulations that are available in the local environment and on the functioning of government institutions, Search has been applied in the Federal Board of Supreme Audit of Iraq (BSA) due to its particular importance as an institution control and as a awaits the societ
... Show MoreAim: To evaluate the cytotoxic activity of newly synthesized a series of novel HDAC inhibitors comprising sulfonamide as zinc binding group and Isatin derivatives as cap group joined by mono amide linker as required to act as HDAC inhibitors. Materials and Methods: The utilization of sulfonamide as zinc binding group joined by N-alkylation reaction with ethyl-bromo hexanoate as linker group that joined by amide reaction with Isatin derivatives as cap groups which known to possess antitumor activity in the designed of new histone deacetylase inhibitors and using the docking and MTT assay to evaluate the compounds. Results: Four compounds have been synthesized and characterized successfully by ART-FTIR, NMR and ESI-Ms. the compounds w
... Show MoreWe have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.
The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F
... Show MoreIn this work, two groups of nanocomposite material, was prepared from unsaturated polyester resin (UPE), they were prepared by hand lay-up method. The first group was consisting of (UPE) reinforced with individually (ZrO2) nanoparticles with particle size (47.23nm). The second group consists of (UPE) reinforced with hybrid nanoparticles consisting of zirconium oxide and yttrium oxide (70% ZrO2 + 30% Y2O3) with particles size (83.98nm). This study includes the effect of selected volume fraction (0.5%, 1%, 1.5%, 2%, 2.5%, 3%) for both reinforcement nano materials. Experimental investigation was carried out by analyzing the thermo-physical properties like thermal conductivity, thermal diffusivity and specific heat for the polymeric composit
... Show More