Preferred Language
Articles
/
SRckro0BVTCNdQwCFRjG
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Study of rheological and mechanical properties of bitumen blended with two alpha phases of polyamide
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Study of rheological and mechanical properties of bitumen blended with two alpha phases of polyamide
...Show More Authors

The effect of D phase polyamide (PA6)on the rheological properties, Young Modulus and the thermal expansion coefficient of two blends groups (bitumen-polyamide) were tested. The first group was for bitumen-PA6 blends and the second group for bitumen blended with polymer resulted from the crystallization of PA6-formic acid solution in water(PAFW).The obtained results proved that adding both types of polyamide has led to a rise in toughness and softening point temperature while the penetration Index approached -3 after adding the polyamide. So, all these changes make bitumen-polyamide blends more suitable for use in hot climate regions. The blends properties were explained according to the reaction that takes place between the polyamide and

... Show More
Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Ama, Agricultural Mechanization In Asia, Africa And Latin America
Effect of three honeycomb interplant distances on growth and flowering of two cultivars of bean
...Show More Authors

A factorial experiment (2× 3) in randomized complete block design (RCBD) with three replications was conducted to examine the effect of honeycomb selection method using three interplant distances on the vegetative growth, flowering, and fruit set of two cultivars of bean, Bronco and Strike. Interplant distances used were 75× 65 cm, 90× 78 cm, and 105× 91 cm (row× plant) represent short (high plant density), intermediate (intermediate plant density), and wide (low plant density) distance, respectively. Parameters used for selection were number of days from planting to the initiation of first flower, number of nodes formed prior to the onset of first flower, and number of main branches. Results showed significant superiority of the Strik

... Show More
Scopus
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Fashions Between Form & Content In Shows of School Drama: محمود جباري حافظ -خــــــالد عبـــــاس شـــــايع
...Show More Authors

Shows of school drama are consisted of visual elements ( Actor (Student ) , ( Fashions , Decoration , Lighting , Make Up , Accessories ) for these elements have privacy being penetrate inside education institutions ( School ) , besides to property of thought direction , teaching for school drama generally , from among these elements are fashions with their designs , colors and various shapes which address student directly by visual . They affect on him as form or content pursuant to movements or design tackles which are made under directive settings and aims of school drama show wholly . Accordingly , this current study presented question for problem of research . Which it is what is relation between form and content for drama fashions t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 04 2018
Journal Name
Civil Engineering Journal
Behavior of Reinforced Reactive Powder Concrete Two-Way Slabs under Static and Repeated Load
...Show More Authors

This paper studies the behavior of reinforced Reactive Powder Concrete (RPC) two-way slabs under static and repeated load. The experimental program included testing six simply supported RPC two-way slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. All the tested specimens were identical in their material properties, and reinforcement details except their steel fibers content. They were cast in three pairs, each one had a different steel fibers ratio (0.5 %, 1 %, and 1.5 %) respectively. In each pair, one specimen was tested under static load and the other under five cycles of repeated load (loading-unloading). Static test results revealed that increasing steel fibres volume fraction from 0.5 % to 1 % and from 1% to 1.5%,

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Analytical Study of the Content of Social and National Studies Textbooks of the Middle Stage in Kingdom of Saudi Arabia in the Light of the Values of Social Peace
...Show More Authors

This study aimed to reveal the extent to which the values of social peace are included in the content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia. To achieve this goal, the researcher used the descriptive analytical approach. The study sample consisted of all developed social and national studies textbooks of the middle stage in kingdom of Saudi Arabia in first and second semester of student books in edition of 1439-1440. The study tool was the analysis card. The study reached the following results: 1-The content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia as a whole included (38) social peace values of total (40) values, corresponding to the inclusio

... Show More
View Publication Preview PDF
Publication Date
Tue May 28 2019
Journal Name
Al-khwarizmi Engineering Journal
Heuristic D* Algorithm Based on Particle Swarm Optimization for Path Planning of Two-Link Robot Arm in Dynamic Environment
...Show More Authors

 Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved.  In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives J.
Evaluation of the performance of triple, single crosses and their inbred in bred lines of maize under two plant population
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref