Preferred Language
Articles
/
Sxctro0BVTCNdQwC3hjb
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize deduplication ratios. Our approach uses data deduplication to remove identical copies of the video. Our experimental results show significant storage savings, while providing strong level security

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Epileptic Seizures Detection Using DCT-II and KNN Classifier in Long-Term EEG Signals
...Show More Authors

     Epilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of  one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Determination of Vitamin B6 (pyridoxine hydrochloride) in Pharmaceutical Preparations Using High Performance Liquid Chromatography
...Show More Authors

Determination of vitamin B6 (pyridoxine hydrochloride) was described using high performance liquid chromatographic method. The analysis was achieved by cosmos IL 5C18-MS-II column (250 mm x 4.6 mm i. d., 5µm particle size) at room temperature. The mobile phase used was Acetonitrile, buffer solution (Citric acid, Na2HPO4 pH4) buffer solution in the ratio (70:30) (V: V). the flow rate was set to 1.25 mL.min-1 and the retention time 1.82 min with UV-detection at 282 nm. Beer's law was obeyed over the concentration range 10-1250 µg.mL-1. The method was accurate (relative error % less than 0.05%), precise (RSD better than ±1.05%), average recovery 100.

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Immobilization of Nuclear Waste Using Carbon Nanotubes Prepared by Laser Ablation in Liquid Method
...Show More Authors

In an attempt to disposal from nuclear waste which threats our health and environments. Therefore we have to find appropriate method to immobilize nuclear waste. So, in this research the nuclear waste (Strontium hydroxide) was immobilized by Carbon nanotubes (CNTs).  The Nd-YAG laser with wave length 1064 nm, energy 750 mJ and 100 pulses used to prepare CNTs. After that adding Sr(HO)2 powder to the CNTs colloidal in calculated rate to get homogenous mixing of CNTs-Sr(OH)2. The Sr(HO)2 absorbs carbon dioxide from the air to form strontium carbonate so, the  new solution is CNTs-SrCO3. To dry solution putting three drops from the new solution on the glass slides. To investigate the radi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 23 2021
Journal Name
Iraqi Journal Of Science
Design of a Sustainable City in Iraq Using SAM Program to Calculate Renewable Energy
...Show More Authors

    Urban design and human activity are main causes of environmental pollution and climate change, such as reliance on energy production plants, factories and transportation that depend on fossil fuels, in addition to transformation of most green areas into residential areas. This paper aims to establish a sustainable city with an environment friendly urban design that contributes to exploitation of natural resources in the generation of electric power, use of green means of transport and thus the reduction of pollution. Anah site was chosen as the best site for designing a sustainable city, with its natural resources, air quality and moderate climate. The total area of ​​the city is 9990187m2 divided into s

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 05 2016
Journal Name
Iraqi Journal Of Science
Local Study of blaCTX-M genes detection in Proteus spp. by using PCR technique
...Show More Authors

n this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and de

... Show More
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
The Impact of using the strategy of shape (V) on the Achievement of the students of the Department of Artistic Education: كريم حواس علي، نجلاء خضير حسان
...Show More Authors

This research aim at finding out the impact of using the strategy of shape V on the achievement of the students of the Department of Artistic Education in the subject of "Principles of scientific Research ". This strategy is one of the cognitive strategies used in this topic . To verify the aim of the research ,the two researchers have put the following null hypothesis:-There are no significant differences on the level of 0,05 among the average degrees of the students of the experimental group in their answers on the topics of the pre and post cognitive achievement tests of the subject of "principles of scientific Research " . The two researchers have adopted the experimental approach which consists of one group . the population of the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Effect of Using Online Automated Feedback on Iraqi EFL Learners’ Writings at University Level
...Show More Authors

Feedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Window Size Changing on Satellite Image Segmentation Using 2D Fast Otsu Method
...Show More Authors

     Multispectral remote sensing image segmentation can be achieved using a multithresholding technique. This paper studies the effect of changing the window size of the two dimensional (2D) fast Otsu algorithm that presented by Zhang. From the results, it shown that this method behaves as a search machine for the valleys (an automatic threshold), between the gray levels of the histogram with changing the size of slide window.  

Keywords Image Segmentation, (2D) Fast Otsu method, Multithresholding, Automatic thresholding, (2D) histogram image.

View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Study the Possibility of using Ground-Penetrating Radar to Detect Walls and Archaeological Finds underground
...Show More Authors

Ground penetrating radar (GPR) is one of the geophysical methods that utilize electromagnetic waves in the detection of subjects below the surface to record relative position and shape of archaeological features in 2D and 3D. GPR method was applied in detecting buried archaeological structure in study area in a location within the University of Baghdad. GPR with 3D interpretation managed to locate buried objects at the depth of (1m) . GPR Survey has been carried (12) vertical lines and (5) horizontal lines using frequency antenna (500) MHZ .

View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref