Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.
The idea of carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed
... Show MoreA simple and rapid high performance liquid chromatographic with fluorescence detection method for the determination of the aflatoxin B1, B2, G1 and G2 in peanuts, rice and chilli was developed. The sample was extracted using acetonitrile:water (90:10, v/v%) and then purified by using ISOLUTE multimode solid phase extraction. After the pre-column derivatisation, the analytes were separated within 3.7 min using Chromolith performance RP-18e (100–4.6 mm) monolithic column. To assess the possible effects of endogenous components in the food items, matrix-matched calibration was used for the quantification and validation. The recoveries of aflatoxins that were spiked into food samples were 86.38–104.5% and RSDs were <4.4%. The method was
... Show MoreGypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image
... Show MoreThis study aims to assess the water quality index (WQI) according to the Canadian Council of Ministers of the Environment's Water Quality Index method (CCME WQI). Four locations (measurement stations) are selected along the Tigris River, in Iraq. Two of them are located in the north near Mosul City, (Mosul Dam and Mosul city), and the other two are located in the south near Al-Amarah city, (Ali Garbi and Al-Amarah). The water data collected is for the period 2011 to 2013, including eleven water quality parameters. These are magnesium (Mg+2), calcium (Ca2+), potassium (K+), sodium (Na+), sulfate (SO42-), chloride (Cl-), nitrate (NO3<
... Show MoreAn easy, eclectic, precise high-Performance Liquid Chromatographic (HPLC) procedure was evolved and validated to estimate of Piroxicam and Codeine phosphate. Chromatographic demarcation was accomplished on a C18 column [Use BDS Hypersil C18, 5μ, 150 x 4.6 mm] using a mobile phase of methanol: phosphate buffer (60:40, v/v, pH=2.3), the flow rate was 1.1 mL/min, UV detection was at 214 nm. System Suitability tests (SSTs) are typically performed to assess the suitability and effectiveness of the entire chromatography system. The retention time for Piroxicam was found to be 3.95 minutes and 1.46 minutes for Codeine phosphate. The evolved method has been validated through precision, limit of quantitation, specificity,
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreA digital elevation model (DEM) is a digital representation of ground surface topography or terrain. It can be represented as a raster (a grid of squares) and it is commonly estimated by utilizing remote sensing techniques, or from land surveying. In this research a 3D building of Baghdad university campus have been performed using DEM, where the easting, northing, and elevation of 400 locations have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from QuickBird satellite sensor (with spatial resolution of 0.6 m). This image has been geo-referenced by selecting ground control points of the GPS. The rectification is running, using 1st order polynomial transformation.
... Show MoreThe application of ultrafiltration (UF) and nanofiltration (NF) processes in the handling of raw produced water have been investigated in the present study. Experiments of both ultrafiltration and nanofiltration processes are performed in a laboratory unit, which is operated in a cross-flow pattern. Various types of hollow fiber membranes were utilized in this study such as poly vinyl chloride (PVC) UF membrane, two different polyether sulfone (PES) NF membranes, and poly phenyl sulfone PPSU NF membrane. It was found that the turbidity of the treated water is higher than 95 % by using UF and NF membranes. The chemical oxygen demand COD (160 mg/l) and Oil content (26.8 mg/l) were found after treatment according to the allowable limits set
... Show More