Preferred Language
Articles
/
RxcXro0BVTCNdQwC3xi7
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Expert Systems
Hybrid intelligent technology for plant health using the fusion of evolutionary optimization and deep neural networks
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Recognition of Upper Limb Movements Based on Hybrid EEG and EMG Signals for Human-Robot Interaction
...Show More Authors

Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky: Sait Faik'in "Havada Bulut" Adlı Hikayesinde Fiil Kiplerinin İncelenmesi.
...Show More Authors

This research paper which is entitled “Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky” deals with the forms of verbs (i.e., kinds of tenses and suffix analysis). It is one of the applied studies. Verbs are basic elements in Turkish sentences. Their function is to state the predicate which is a sentential essential part. Verbs denote sentence construction, action and formal aspects. Forms are added to the base of verbs in the Turkish language giving the verbs their final structures. Such structures are set in a distinct planned way. The verbs used in the Turkish language which are distinguished by one of these forms are known as simple tense verbs.

Sait Faik'in ( "Havada Bulut" adlı Hikayesinde Fi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Applying the substance-field model mechanism to problem solving in industrial product design: محمد علي حسين القيسي
...Show More Authors

  Problem solving methods and mechanisms contribute to facilitating human life by providing tools to solve simple and complex daily problems. These mechanisms have been essential tools for professional designers and design students in solving design problems.
This research dealt with one of those mechanisms, which is the (the substance-field model model), as it has been mentioning that this mechanism is characterized by the difficulty of its application, which formed the main research problem. In home gardens (the sub-problem of research), an analysis of this problem was applied and then a solution was found to address it. The researcher used the 3dsmax program to implement the proposed design.
The most important research res

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Statistics And Its Interface
Search for risk haplotype segments with GWAS data by use of finite mixture models
...Show More Authors

The region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Design and Implementation of Real Time Face Recognition System (RTFRS)
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Design and Implementation of a Contactless Smart House Network System
...Show More Authors

The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Design & Implementation of High Switching & Low Phase Noise Frequency Synthesizer
...Show More Authors

This research  describes the design & implementation of frequency synthesizer using single loop Phase lock loop with the following specifications: Frequency range (1.5 – 2.75) GHz,Step size (1 MHz), Switching time 36.4 µs, & phase noise @10 kHz = -92dBc & spurious -100 dBc

  The development in I.C. technology provide the simplicity in the design of frequency synthesizer because it implements the phase frequency detector(PFD) , prescalar &  reference divider in single chip. Therefore our system consists of  a single chip contains (low phase noise PFD, charge pump, prescalar  & reference divider), voltage controlled oscillator , loop filter & reference oscillator. The single chip

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Pharmaceutical Inventory Database Management System
...Show More Authors

The main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed

... Show More
View Publication Preview PDF
Crossref