Preferred Language
Articles
/
Sxctro0BVTCNdQwC3hjb
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize deduplication ratios. Our approach uses data deduplication to remove identical copies of the video. Our experimental results show significant storage savings, while providing strong level security

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2015
Journal Name
International Photonics And Optoelectronics
Canonical Logic Units using Bidirectional Four-Wave Mixing in Highly Nonlinear Fiber
...Show More Authors

All-optical canonical logic units at 40 Gb/s using bidirectional four-wave mixing (FWM) in highly nonlinear fiber are proposed and experimentally demonstrated. Clear temporal waveforms and correct pattern streams are successfully observed in the experiment. This scheme can reduce the amount of nonlinear devices and enlarge the computing capacity compared with general ones. The numerical simulations are made to analyze the relationship between the FWM efficiency and the position of two interactional signals. © 2015 Chinese Laser Press

View Publication
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Corrosion behavior of mild-steel in cooling towers using high salinity solution
...Show More Authors

Cooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Measurement of Natural Radioactivity in different cigarettes samples by using (HPGe) detector
...Show More Authors
Abstract<p>Twelve samples of cigarettes have been collected from local markets of different types and origins by using (HPGe) detector, and measurement of the specific activity for series U<sup>238</sup> and series Th<sup>232</sup> in addition to K<sup>40</sup> in order to estimate the health risk of cigarettes their by smokers, the results shown that highest specific activity value were be (12. 8±6. 3 Bq/kg, 8. 41±5. 8 Bq/kg, 125. 16±58. 3 Bq/kg), respectively, in the sample (MAC) MacBeth type cigarettes in Brazilian origin, this paper reports data such as (specific activity of K<sup>40</sup>, series U<sup>238</sup>, series Th<sup>232</sup></p> ... Show More
View Publication
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Numerical Study of Heat Transfer Enhancement in Heat Exchanger Using AL2O3 Nanofluids
...Show More Authors

In this study, the flow and heat transfer characteristics of Al2O3-water nanofluids for a range of the Reynolds number of 3000, 4500, 6000 and 7500 with a range of volume concentration of 1%, 2%, 3% and 4% are studied numerically. The test rig consists of cold liquid loop, hot liquid loop and the test section which is counter flow double pipe heat exchanger with 1m length. The inner tube is made of smooth copper with diameter of 15mm. The outer tube is made of smooth copper with diameter of 50mm. The hot liquid flows through the outer tube and the cold liquid (or nanofluid) flow through the inner tube. The boundary condition of this study is thermally insulated the outer wall with uniform velocity a

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Solar Energy
A review of studies on using nanofluids in flat-plate solar collectors
...Show More Authors

Continuous escalation of the cost of generating energy is preceded by the fact of scary depletion of the energy reserve of the fossil fuels and pollution of the environment as developed and developing countries burn these fuels. To meet the challenge of the impending energy crisis, renewable energy has been growing rapidly in the last decade. Among the renewable energy sources, solar energy is the most extensively available energy, has the least effect on the environment, and is very efficient in terms of energy conversion. Thus, solar energy has become one of the preferred sources of renewable energy. Flat-plate solar collectors are one of the extensively-used and well-known types of solar collectors. However, the effectiveness of the coll

... Show More
Scopus (130)
Crossref (123)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Furfural Degradation in Waste Water by Advanced Oxidation Process Using UV/H2O2
...Show More Authors

Furfural is one of the one of pollutants in refinery industrial wastewaters. In this study advanced oxidation process using UV/H2O2 was investigated for furfural degradation in synthetic wastewater. The results from the experimental work showed that the degradation of furfural decreases as its concentration increases, reaching 100% at 50mg/l furfural concentration and increasing the concentration of H2O2 from 250 to 500 mg/l increased furfural removal from 40 to 60%.The degradation of furfural reached 100% after 90 min exposure time using two UV lamps, where it reached 60% using one lamp after 240 min exposure time. The rate of furfural degradation k increased at the pH and initial concentratio

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Diagnosing COVID-19 Infection in Chest X-Ray Images Using Neural Network
...Show More Authors

With its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques.  T

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Sentiment analysis in arabic language using machine learning: Iraqi dialect case study
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref