Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.
In present project, new Schiff base of 4, 4'- (((1E, 1'E)-1,4-.phenylenebis- (methane-ylylidene))-bis-(azane-ylylidene)) bis-(5-(4-chlorophenyl) -4H -1,2,4-triazole-3-thione) (L3) has been synthesized by condensation of 4-amino-5-(4-chlorophenyl)-2,4-dihydro-3H-1,2,4-triazole-3-thione with benzene-1,4-dicarboxaldehyde. The new asymmetrical Schiff base (L3) used as a ligand to synthesize a new complex with Co(II), Ni(II), Cu(II), Pd(II), and Pt(IV) metal ions by 1:2 (Metal: ligand) ratio. New ligand and their complexes have been exanimated and Confirmed by Fourier-transform infrared (FT-IR), Ultraviolet-visible (UV-visible), Proton nuclear magnetic resonance (1HNMR), carbon13 nuclear magnetic resonance (13CNMR), carbon-hydrogen nitrogen sulf
... Show MoreBackground: Extracorporeal Shock wave lithotripsy (ESWL) is widely used in treating patients with ureteralstones because it is effective, safe, and noninvasive. Based on factors such as size and the location of stones,there is a significant variation in the overall stone-free rate (SFR).Aim of the study: To evaluate the effect of ureteral wall thickness (UWT), stone attenuation, the time fromfirst attack of pain till first session of ESWL and stone/ rib density on the outcome of SWL in the treatmentof upper ureteral stones (UUS).Patient and methods: A prospective study when 127 patients with radio-opaque UUS ranging from 7 to 20mm and treated by ESWL were included in this study. The effect of (stone/ 12th rib) density by KUB, ureter
... Show MoreThe solar radiation plays an important role on the energy balance of the earthatmosphere, which is the main source of energy. Also the solar radiation is a main factor of all applications which use a solar energy as renewable energy source. The purpose of this research is to study the monthly average changes for solar radiation for the period from 1985 to 1989 by using satellite Antenna Alignment from (NASA). The result shows that the monthly average radiation changes from one year to another because of the changing of it component of atmosphere, (gases, clouds and Aerosols) and as an enhancement for this conclusion, we compared the results with the monthly average radiation at clear atmosphere where the change was slig
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.