Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Crime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the natu
... Show MoreIraq's oil industry has been passed in different periods , began with domination of Western companies to invest in Iraqi oil at twenties of the last century , through the process of nationalization of the shares of those companies , beginning of the seventies , and ending with the new policies adopted by the government recently, which was contracting with international companies to develop the oil industry , because of what the outcome of the oil industry from a decline in artistic and physical ability as a result to the conditions of war and embargo imposed on Iraq before 2003.
The Iraqi government has introduced licensing of a contract to
... Show MoreThe aim of the research is to identify the role of public relations in promoting tourism by the Palestinian tourism and travel companies in Gaza from the public relations officer’s point of view in those companies.
The researcher used the descriptive analytical method as the most appropriate for such studies and implemented the questionnaire as a tool to obtain the required data from the respondents.
The Researcher reached several conclusions:
1- There is a low percentage of women working in the field of public relations in Palestinian tourism establishments in the Gaza Strip, where the percentage did not exceed 5%.
2- The interpersonal communication counted as one of the elements of integra
This research aims to clarify the role of Information Technology Competency (ITC) with dimensions' (IT Usage, IT Knowledge, and IT Operations) as an independent variable in the activation of Human Resources Management Practices (HRM Practices) as a dependent variable with dimensions' (Training and Development, Recruitment, Job Design, and Performance appraisal). Based on this, the correlation and effect relationships between the independent and dependent variables are determined by formulating two main hypotheses. There are a significant relationship and effect of IT competency with HRM practices within the dimensions. Furthermore, the scope and population of this research are the Informatics and Communications P
... Show MoreThe tax exemption, whether wholly or partially, and for an unlimited duration of the investment or for a limited period of few years, is one of the encouraging things to the flow of foreign capital. And if necessary, impose tax on the profits of the invested capital, the promotion requires that not be discriminatory taxes or payments in the amount of money with the need to avoid double taxation. The tax exemption is granted by the government and the feature according to the law of a natural person or legal entity seeking from the government purports to achieve a set of political goals, economic and social development. The reduction of taxes or grants partial exemption is one of the factors that encourage attract of direct foreign i
... Show MoreThe research aimed to compare the performance of the commercial and the Islamic banks listed in the Palestinian's Stock Exchange .To achieve the objectives of the study we selected all the commercial and the Islamic banks listed in the Palestinian Stock Exchange to obtain the necessary data for the analysis process during the period of (2009-2013) .the comparison based on the performance indicators ( liquidity rate, profitability rate ,the activity rate and the market rate).
a statistical method was used to analyze the date to find the performance differences between the commercial banks,
... Show MoreIraqi EFL college instructors, who supervise the teaching practice of EFL student teachers, commonly experience the inefficient teaching performance of prospective teachers. This inefficiency is usually due to their inability to make connections between the practical experience and the theoretical knowledge of TEFL. One of the reasons behind this inability may be the employment of traditional ways of training and instructing student teachers. Moreover, it is usually noticed that many Iraqi EFL student teachers have a negative attitude toward the teaching profession. They explicitly state that they would join the teaching force only if they fail to work in any other field.
... Show MoreBACKGROUNDS Nasoalveolar molding (NAM) application is among presurgical management (PSM) techniques used for infants with cleft lip and palate (CLP). It helps to approximate the palatal cleft and to reshape the nasoalveolar complex prior to primary lip repair. This study aimed to explore types of PSM and the dental speciality provision for infants with CLP in Baghdad. The status of NAM usage and surgeons’ perceptions toward NAM usage were assessed. MATERIALS AND METHODS This is a cross-sectional paper-based questionnaire study that collected responses of surgeons perform primary lip and nose repair regarding PSM. The questionnaire was distributed amongst public and private hospitals in Baghdad. Twenty surgeons were enrolled (only those su
... Show More