Preferred Language
Articles
/
joe-1635
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Evaluation of the Accuracy of Digital Elevation Model Produced from Different Open Source Data
...Show More Authors

This study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Thu Mar 19 2026
Journal Name
Journal Of Petroleum Research And Studies
Improving the Reliability of Well Log Data Recorded in Oil and Gas Wells through Quality Control Approaches: A Case Study from a Southern Iraqi Field
...Show More Authors

Quality control of well logs has always been an important objective in reservoir studies because of the key role played by well logs as input data. This study aims to make a quality control on well logs data for two wells of Yamama formation in southern Iraqi field to ensuring and enhancing the measurement accuracy. In the beginning, the calibration data of before and after surveys are applied as initial evaluation for the quality of density log in well R-1. Then, depth matching is used to fit the depth of all logs in each well. After that, the comparison between the main and repeat sections is helped to check the repeatability. Finally, all uncorrected logs are environmentally corrected to remove the effects of the borehole conditi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting disclosure in granting bank financing A field study ona sample of banks operating in the state of Gezira 2022 AD: (دراسة ميدانية على عينة من المصارف العاملة في ولاية الجزيرة 2022م)
...Show More Authors

                 The aim of the research is to identify the adequacy of accounting disclosure in granting bank financing in explaining the role of accounting disclosure in granting bank financing by linking the concepts of full, comprehensive and adequate disclosure to bank financing. The impact of full accounting disclosure on granting bank financing, the existence of an impact of comprehensive accounting disclosure on granting bank financing, the existence of an impact of adequate accounting disclosure on granting bank financing, and the research relied on the descriptive approach, the deductive and inductive approach, the inferential analytical approach, a

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Frequency of Pulmonary Aspergillosis Among Clinically Suspected and Under Treatment Tuberculosis Patients , Khartoum State , Sudan
...Show More Authors

Background

Respiratory tract aspergillosis is a pulmonary disease cause by aspergillus species which are opportunistic fungi that mainly infect immuno-compromised patients .

 Objective(s)

The present study aimed to detect the frequency of pulmonary aspergillosis among clinically suspected and under follow up tuberculosis patients conducted at Tropical Diseases Teaching Hospital, Omdurman, Khartoum State , Sudan during the period from December 2019 to November 2020.

 Materials and Methods

One hundred and fifty sputum samples were collected from suspected cases of pulmonary tuberculosis and under follow up tuberculosis patients. All specimens were examined using 20% KOH and cultured on two

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 11 2023
Journal Name
Applied Sciences
A Preliminary Study and Implementing Algorithm Using Finite State Automaton for Remote Identification of Drones
...Show More Authors

Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
A Comparative Study of Some Methods of Estimating Robust Variance Covariance Matrix of the Parameters Estimated by (OLS) in Cross-Sectional Data
...Show More Authors

 

Abstract

The Classical Normal Linear Regression Model Based on Several hypotheses, one of them is Heteroscedasticity as it is known that the wing of least squares method (OLS), under the existence of these two problems make the estimators, lose their desirable properties, in addition the statistical inference becomes unaccepted table. According that we put tow alternative,  the first one is  (Generalized Least Square) Which is denoted by (GLS), and the second alternative is to (Robust covariance matrix estimation) the estimated parameters method(OLS), and that the way (GLS) method neat and certified, if the capabilities (Efficient) and the statistical inference Thread on the basis of an acceptable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref