Preferred Language
Articles
/
Sxctro0BVTCNdQwC3hjb
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize deduplication ratios. Our approach uses data deduplication to remove identical copies of the video. Our experimental results show significant storage savings, while providing strong level security

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reducing of Corrosion Rate in Boiler Tubes by Using Oxygen Scavengers
...Show More Authors

The corrosion behavior of carbon steel at different temperatures 100,120,140 and 160 Cͦ under different pressures 7,10 and 13 bar in pure distilled water and after adding three types of oxygen scavengers Hydroquinone, Ascorbic acid and Monoethanolamine in different concentrations 40,60 and 80 ppm has been investigated using weight loss method. The carbon steel specimens were immersed in water containing 8.2 ppm dissolved oxygen (DO) by using autoclave. It was found that corrosion behavior of carbon steel was greatly influenced by temperature with high pressure. The corrosion rate decreases, when adding any one of oxygen scavengers. The best results were obtained at a concentration of 80 ppm of each scavenger. It was observed that 

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result

... Show More
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Science And Research (ij
Simulation of Chlorine Decay in Al-Gukook WaterDistribution Networks Using EPANET
...Show More Authors

The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib

... Show More
Publication Date
Thu Sep 01 2022
Journal Name
Neuroquantology
Evaluation of using of square flap in treatment of Postburn Contracture
...Show More Authors

Background: One of the most common problems that encountered is postburn contracture which has both functional and aesthetic impact on the patients. Various surgical methods had being proposed to treat such problem. Aim: To evaluate the effectiveness of square flap in management of postburn contracture in several part of the body. Patients and methods: From April 2019 to June 2020 a total number of 20 patients who had postburn contracture in various parts of their body were subjected to scar contracture release using square flap. The follow up period was ranging between 6 months to 12 months. Results: All of our patients had achieved complete release of their band with maximum postoperative motion together with accepted aesthetic outcome. A

... Show More
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Sun Dec 25 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of Hepatic Enzymes in major β-thalassemic Patients using Deferasirox
...Show More Authors

Abstract

β-thalassemia major is a genetic disease that causes sever defect in normal hemoglobin synthesis. The patients with β-thalassemia major need periodic blood transfusions that can result in accumulation of body iron, so treatment with iron chelating agent is required. Complications of this iron overload affecting many vital organs, including the liver. The aim of this work was to evaluate liver enzymes in β -thalassemia major patients with deferasirox versus without it. Two groups of β-thalassemia major patients were involved in this study named group A; 40 β-thalassemia patients of blood transfusion dependent without deferasirox, group B; 40 β-thalassemia patients of blood transfusion dependent on de

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Mar 07 2014
Journal Name
Annals Of Applied Biology
High throughput screening of rooting depth in rice using buried herbicide
...Show More Authors
Abstract<p>Root research requires high throughput phenotyping methods that provide meaningful information on root depth if the full potential of the genomic revolution is to be translated into strategies that maximise the capture of water deep in soils by crops. A very simple, low cost method of assessing root depth of seedlings using a layer of herbicide (<styled-content style="fixed-case">TRIK</styled-content> or diuron) buried 25 or 30 cm deep in soil‐filled boxes of varying size is described that is suitable for screening hundreds or thousands of rice accessions in controlled environment conditions. Variation in cultivar sensitivity to the herbicide when injected into pots was detected but con</p> ... Show More
View Publication
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Artificial Intelligence and Trends Using in Sustainability Audit: A Bibliometric Analysis
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Determinants of using experimental groups and choosing reasons in psychological researches
...Show More Authors

Until The Second Half Of Nineteenth Century  , Psychology Depended On Philosophy In Its Experiences Which Means It Depend On Individuals Feelings Toward Psychological Experiences And Rapid Observation . As For The Scientific Organized Experimentation And Observation By Machines Have Been Used Later   .

The Experimentation Looking For The Cause Of  Phenomena And How Is That Happened   Also Reveal The Causal Relationship Between Among Phenomena . The Experiences In Psychology Field Include In Its Simplest Form Only One Variable ( Effective) Which Is Called Independent Variable As Well As Another Variable ( Affected )   That Called  Dependent Variable .

... Show More
View Publication Preview PDF