Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.
In this study, the researcher aims to analyze the content of the physics textbook for the 3rd intermediate grade according to the criteria for designing and producing infographics, and the research community consists of the content of the physics textbook for the 3rd intermediate grade intermediate grade for the academic year 2021-2022. The researcher adopted the analysis instruments with a number of the criteria for designing and producing infographics. The results revealed randomness in the percentage of the criteria included in the content of the physics textbook for the 3rd intermediate grade, and they are not compatible with the proposed criteria by the experts also.
Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t
... Show MoreThis work was influenced the separation and preconcentration steps were carried out to determination of metformin (MET) in pharmaceutical preparations and human serum samples. Complex formation method and cloud-point extraction (CPE) coupling with UV-Visible spectrophotometry were used to investigated of study target.The results has showed the best optical characteristic for calibration curve and statistical data which were obtained under optimum conditions. The first method is based on the reaction of MET with nickel (II) in alkaline medium an absorption maximum ?)max) at 434nm. ''Beer's low'' is obeyed in the concentration range (10-100µg.ml-1) with molar absorptivity of 3.9x103 L.mol-1.cm-1.The limit of detection and quantitation valu
... Show MoreThis research was dealing with the aesthetic impact of encryption in form and content and aesthetic implications in the design of contemporary fabrics. That's where the design of the cloth is linked to the continuous development and continuous innovation and the pursuit of the all-new innovative designs and at the same time an unmarked Cryptographic with semantics and symbols reflect reality aesthetically pleasing and contains four chapters on the research :The first chapter discusses the research problem and its significance is the current quest ( encryption in form and content in contemporary designs fabrics and aesthetic implications ) in that it shows the importance of encryption in the design of fabrics and foundation design configu
... Show MoreThe purpose of this research is to design a list of the scientific and moral values that should be found in the content of the computer textbook for the second intermediate grade, as well as to analyze the content of the above- mentioned book by answering the following question:
What is the percentage of availability of scientific and moral values in the content of the computer textbook for Second Intermediate grade issued by the Iraqi Ministry of Education / the general directorate of the curriculum, for the academic year (2017-2018)?
In order to achieve the research objectives, the descriptive method (content analysis method) was adopted. The research community has been iden
... Show MoreMost available methods for unit hydrographs (SUH) derivation involve manual, subjective fitting of
a hydrograph through a few data points. The use of probability distributions for the derivation of synthetic
hydrographs had received much attention because of its similarity with unit hydrograph properties. In this
paper, the use of two flexible probability distributions is presented. For each distribution the unknown
parameters were derived in terms of the time to peak(tp), and the peak discharge(Qp). A simple Matlab
program is prepared for calculating these parameters and their validity was checked using comparison
with field data. Application to field data shows that the gamma and lognormal distributions had fit well.<
Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co
... Show MoreEach organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje
... Show More