Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.
This research studyies wear rate of composite materials by using Epoxy Resin and Polyurethane Rubber as a matrix of weigt percentage (90:10) (Ep/Pu) and reinforced by PVC fibers and Aluminum fibers two dimension knitted mat with fractional volume(15 %), in different conditions like: lab conditions and after submerge the samples in water for different periods of time. . four kinds of materials were prepared: (Ep+pu), (Ep+Pu+PVC), (Ep+Pu+Al.F), (Ep+Pu+PVC+Al. F) .And the results have shown that the best wear resistance are for the hybrid composite material (Ep + Pu+ PVC + Al. F) and wear rate of all samples increased when it was submerged in water
New membrane electrodes for determination of ciprofloxacin hydrochloride were prepared depending on ciprofloxacin hydrochloride - phosphotungstic acid (CFH-PT) as an active material and these electrodes were made with three plasticizers: Di-octylphenylphosphonate(DOPH), Di-butyl phosphate (DBP)Tri-n-butyl phosphate(TBP), in PVC matrix. One of the ciprofloxacin electrodes was gave Nernstian slope equal to 57.21 mV/ decade for DOPH membrane with concentration range from 1.5×10-5 to1.0×10-1 M, and detection limit equal to 1.5×10-6 M .Lifetime was 93 days. Non- Nernstian responses equal to 39.40 and 30.70 mV/ decade for membranes DBP, TBP, respectively. These electrodes were gave concentration range from 1.0× 10-5 to 1.0×10-2 and from 4.0
... Show MoreA new approach and the developed FIA technique with many advantages (economic, fast, simple, accurate, and high throughput) are used to determine the decongestant drugs (Phenylephrine.HCl, Oxymetazoline.HCl) in biological samples, pharmaceutical formulations, and pure samples via continuous flow injection technique by oxidative coupling reaction, where the method depends on the interaction of the decongestant drug with organic reagents to produce colored compounds, where Phenylephrine reacts with 4-AAP at λmax503 nm to produce a red compound, and the Beer’s law range of 10-600 μg.mL-1 . As for Oxymetazoline, it reacts with DNPH at λmax 631nm to produce a green compound with a linear dynamic range of
... Show MoreHousing finance is one of the main components of housing, and it is relied upon to help families buy, build, add building, and housing improve. Accordingly, different countries all over the world set policies and strategies for the purpose of organizing and developing the financial sector to solve quantitative and qualitative housing problems.
This research aims to identify housing finance policies and strategies in Iraq and Baghdad governorate.
The most prominent sources of housing financing are the Real Estate Bank and the Housing Fund, and accordingly the focus has been on the role of these two institutions in filling
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show More