Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues.
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreMachine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAbstract
The scope of the humanitarian tragedies in the Arab region has widened after the conflicts that erupted over the past years, exacerbation to include educational, cultural, and social dimensions, economic and moral aspects of the displaced families, especially after the emergence of terrorist organizations and sectarian conflicts which overthrew human and led to various political and demographic changes, forcing citizens to leave their homes, fleeing with their families from the danger of murder, terrorism, and violation to other safer areas inside or outside their countries. Women and children were the vast majority of the displaced who were subjected to great pressures, The host communities bore the pro
... Show MoreAbstract
The study was conducted in Baghdad and aimed to:
The impact of moving the educational activities in the conservation of literary
texts and the development of literary taste in the fifth grade students moral "by
verifying the validity of hypotheses Elsafreeten following forms:
The first hypothesis:
- There are no differences in women with statistical significance between means
of scores of students three experimental groups, the experimental group first
used upstream activities in the teaching material of literature and texts, the
second experimental group used the activities of building in the teaching
material itself and the experimental group the third use activities concluding
taught the same
This study included an analysis of three stations (Al Dora, Al Za'franiya, and Arab Ejbur) chosen to study the Physiochemical and microorganism (Fungi and Bacteria) loud of the Tigris River in the southern section of Baghdad city. The result of this research shows that the highest temperature recorded in summer in Al Za'franiya was 37Co, while the lowest temperature recorded in winter in Al Dora was 9Co. and the value of pH recorded the highest in summer it was 7.9 in Arab Ejbur, and the lowest value was in winter 7.1 in Al Dora regions, While Total Organic Carbon (TOC) shows the highest values found in the summer was 6.7 Mg L-1in Al Za'franiya Samples, and the lowest values were 2.0 Mg L-1in Arab Ejbur during the winter. The more f
... Show MoreAdvertising is an important and influential tool in various commercial operations, as it represents a means of communication that depends on influencing individuals or society as a whole, working on a link between the producer and the consumer, so the importance of advertising appears in two dimensions, the first is economic represented in its role in achieving economic growth for the facility, while the social dimension lies in its role By influencing the behaviors and ideas of individuals, and from here it appears to us the importance of formulating, organizing and designing the advertising message that advertising agencies resort to in their advertising campaigns. Orientation, definition, and raising the level of the advertising messa
... Show More