Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.
The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThe Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (c
The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services
... Show MoreAccording to different types of democracy Indexes, hybrid regimes or those in the gray zone, make up the majority of regime transformations in the third wave of democracy. However, after nearly three decades, conceptual confusion about hybrid regimes persists and grows, while obstructing the accumulation of knowledge about the nature of hybrid regimes. This leads to significant political repercussions for democratization. This Paper attempts to provide a clearer view of different and overlapping concepts and classifications in this complex field, and sustain development in literature on democratic transformation. To achieve this, we followed an approach based on the classification of concepts and terms in three distinct categories, b
... Show MoreBackground: Although underdeveloped in Iraq, telehealth was one tool used to continue health service provision during the COVID-19 pandemic. Aim: To assess women’s experiences and satisfaction with gynaecological and obstetric telehealth services in Iraq during the COVID-19 pandemic. Methods: Free telehealth services were provided by 4 obstetrician-gynaecologists associated with private clinics in 2020–2021. All patients who accessed the services between June 2020 and February 2021 were invited to complete a postconsultation survey on their experience and satisfaction with services. Results were analysed using descriptive statistics and logistic regression conducted using SPSS version 25. Results: A total of 151 (30.2%) women re
... Show MoreA procedure for the mutual derivatization and determination of thymol and Dapsone was developed and validated in this study. Dapsone was used as the derivatizing agent for the determination of thymol, and thymol was used as the derivatizing agent for the determination of Dapsone. An optimization study was performed for the derivatization reaction; i.e., the diazonium coupling reaction. Linear regression calibration plots for thymol and Dapsone in the direct reaction were constructed at 460 nm, within the concentration range of 0.3-7 μg ml-1 for thymol and 0.3-4 μg ml-1 for Dapsone, with limits of detection 0.086 and 0.053 μg ml-1, respectively. Corresponding plots for the cloud point extraction of thymol and Dapsone were constructed
... Show MoreThe research aims to explain the role of cloud computing technology in facilitating the application of international financial reporting standards in Iraqi banks, by preparing a checklist that included a set of paragraphs to measure the level of application of IFRSs. In those banks and then the need to use cloud computing technology, and the researchers reached a set of conclusions, including, that cloud computing technology has a role in facilitating the application of international financial reporting standards in the banks, the research sample, because of the ease it provides in preparing and saving accounting information and the possibility of accessing it in any time and from any place where the Internet service is available. T
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.