Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
The purpose of this research highlight the achievement of the effectiveness of small and medium enterprises dimensions and conformable to analyze the relationship between business strategies and human resources management strategies , and launched search of a dilemma thought provoking fundamental questions revolve around the search is the lack of appropriate strategies in these enterprises to help them continuity and permanence in business and markets , as these enterprises lack the human resources management strategies appropriate , as well as business strategies that make them withstand the changes in the market environment is changing and volatile . It was to
... Show MoreThe current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev
... Show MoreA spectrophotometric- reverse flow injection analysis (rFIA) method has been proposed for the determination of Nitrazepam (NIT) in pure and pharmaceutical preparations. The method is based upon the coupling reaction of NIT with a new reagent O-Coumaric acid (OCA) in the presence of sodium periodate in an aqueous solution. The blue color product was measured at 632 nm. The variation (chemical and physical parameters) related with reverse flow system were estimated. The linearity was over the range 15 - 450 µg/mL of NIT with detection limits and limit of quantification of 3.425 and 11.417 µg mL-1 NIT,respectively. The sample throughput of 28 samples
... Show MoreWith a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offer
... Show MoreThe purpose of this paper is to model and forecast the white oil during the period (2012-2019) using volatility GARCH-class. After showing that squared returns of white oil have a significant long memory in the volatility, the return series based on fractional GARCH models are estimated and forecasted for the mean and volatility by quasi maximum likelihood QML as a traditional method. While the competition includes machine learning approaches using Support Vector Regression (SVR). Results showed that the best appropriate model among many other models to forecast the volatility, depending on the lowest value of Akaike information criterion and Schwartz information criterion, also the parameters must be significant. In addition, the residuals
... Show MoreThe organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte
... Show More