Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreNoor oil field is one of smallest fields in Missan province. Twelve well penetrates the Mishrif Formation in Noor field and eight of them were selected for this study. Mishrif formation is one of the most important reservoirs in Noor field and it consists of one anticline dome and bounded by the Khasib formation at the top and the Rumaila formation at the bottom. The reservoir was divided into eight units separated by isolated units according to partition taken by a rounding fields.
In this paper histograms frequency distribution of the porosity, permeability, and water saturation were plotted for MA unit of Mishrif formation in Noor field, and then transformed to the normal distribution by applying the Box-Cox transformation alg
... Show MoreVarious assays are used to determine the toxic effects of drugs at cellular levels in vitro. One of these methods is the dye exclusion assay, which measures membrane integrity in the presence of Trypan blue. Trypan blue the dye which was used in this study to investigate cytotoxic effect of a new Cis –dichloroplatinum (II) complex [(Qu)2PtCl2] on the viability of polymorphonuclear cells (PMNs). Three concentrations of platinum complex were prepared (70, 35and 17.5 µg/ ml) and the results revealed that the percentage of cell viability decreased as the platinum complex concentration increased in comparison with control.
... Show MoreAny city that has such a market and is organized, organized and established
Mini
And respect
Freedom of expression
Profile.
Conflict resolution and conflict resolution
Political
Which affected the growth of some markets
And religious th
The search for the return of economic and cultural activity and the emigration of some others
Cultural exchange and trade, which in turn
Al-Rifaie
We took the problem that we are experiencing
Menia, the holy city of Karbala in the market organization, has suffered from fierce attacks
Economic and heritage
e
As well as tourism and tourism, as it depends on the abundance of visitors, tourists and residents in terms of needs and motivation
Resource
The birth of Multiple Intelligence (MI) theory has revolutionized traditional education since the twentieth century. Howard Gardner, the pioneer of this theory, believed that each learner has a unique way of acquiring information. This paper investigates how the New Headway Plus for Upper-Intermediate-Third Edition, a standard EFL textbook in Iraqi universities, can cater to the diverse MI profiles of Iraqi EFL learners. It evaluates the success or failure of senior undergraduates in actively engaging with different learning styles and activities in the classroom. The study maps the distribution of nine distinct modes of MI theory across all 12 Units_ Logic/Mathematical, Verbal/Linguistic, Musical, Bodily/Kinesthetic, Visual/Spatial, Natura
... Show MoreBlockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show MoreNew trends in teaching and learning theory are considered a theoretical axis
from which came the background that depends on any source, or practice sample or
teaching plane, accuracy and simplicity prevent the development of the teaching
process. Many attempts have come to scene to illuminate the teaching background,
but they have not exceed those remarkable patterns and methods. Thus, the
appearance of the teaching theory have been hindered.
This led to the need for research and development in the field of teaching to
find out a specific teaching theory according to the modern trends and concepts.
Teaching is regarded a humanitarian process which aims at helping those who
want to acquire knowledge, since teach
A simple ,accurate and sensitive spectrophotometric method has been developed the determination of Cobalt(II) and Cupper (II) .The method is based on the chelation of Co(II) and Cu(II) ions with 4-(4´-pyrazolon azo) -2-Naphthol(APAN) in aqueous medium . The complexes have a maximum absorption at (513) and (506) nm and ? max 0.531×10 4 and 0.12×10 5 L.mol -1.cm -1 for Co(II) and Cu(II) respectively .The reagent and two complexes have been prepared in ethanolic solution.The stoichiometry of both complexes were found to be 1:2 (metal :legend) .The effects of various cations and anions on Co(II) and Cu(II) determination have been investigated .The stability constants and standard deviations for Co(II) and Cu(II) 0.291 x107 ,0.909X108 L.mol
... Show More