Preferred Language
Articles
/
Sxctro0BVTCNdQwC3hjb
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize deduplication ratios. Our approach uses data deduplication to remove identical copies of the video. Our experimental results show significant storage savings, while providing strong level security

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (20)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Proceedings Of The Thermal And Fluids Engineering Summer Conference
HEAT TRANSFER ENHANCEMENT IN PCM THERMAL ENERGY STORAGE VIA THE TRIPLEX TUBE HEAT EXCHANGER
...Show More Authors

Crossref (1)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Joint Conference On Neural Networks (ijcnn)
A Fast Feature Extraction Algorithm for Image and Video Processing
...Show More Authors

View Publication
Scopus (40)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
The study of water quality changes using GIS and remote sensing for Tigris River through Salah Al-Din province, Iraq
...Show More Authors

The most significant water supply, which is the basis of agriculture, industry and human and wildlife needs, is the river. In order to determine its suitability for drinking purposes, this study aims to measure the Water Quality Index (WQI) of the Tigris River in the Salah Al-Din Province (center of Tikrit), north of Baghdad. For ten (9) physio-chemical parameters, namely turbidity, total suspended sediments, PH, electrical conductivity, total dissolved solids, alkalinity, chloride, nitrogen as nitrate, sulphate, and then transported for examination to the laboratory, water samples were collected from 13 locations along the Tigris river. Using the weighted arithmetic index method, the WQI was measured and found to be 105,87 in up-stream, wh

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Determining and Predicting the Water Demand Dynamic System Model Mapping Urban Crawling and Monitoring Using Remote Sensing Techniques and GIS
...Show More Authors

Publication Date
Sat Jun 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Thickening Time and Compressive Strength Correlations for Bentonitic- Class "G" Cement Slurries
...Show More Authors

Empirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.

View Publication Preview PDF
Publication Date
Thu Dec 26 2024
Journal Name
Revista Electronica De Leeme
The Image of Women in the Lyrics of The Arabic Music Video: An Analytical Study of the Most-Watched Arabic Songs on YouTube in 2024
...Show More Authors

 Several studies have indicated an unprecedented increase in the number of Arab youth who watch music videos. It is also a custom in Arab countries to broadcast songs at their happy parties such as weddings, engagements and birthdays. We see that guests and party owners interact by dancing and singing with the songs, while the viewership rates of Arab music videos have reached millions on YouTube. The researcher decided to study the image of women through the lyrics of these songs, due to their importance in shaping the image of women in the minds of young people and shaping the (self-image) of young women. Twenty songs were selected from the most watched songs on YouTube for the year 2024, and it was found that the negative qualities of t

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Assessing Service Quality using Data Envelopment analysis Case study at the Iraqi Middle East Investment Bank
...Show More Authors

The use of data envelopment analysis method helps to improve the performance of organizations in order to exploit their resources efficiently in order to improve the service quality. represented study a problem in need of the Iraqi Middle East Investment Bank to assess the performance of bank branches, according to the service quality provided, Thus, the importance of the study is to contribute using a scientific and systematic method by applying  the data envelopment analysis method in assessing the service quality provided by the bank branches, The study focused on achieving the goal of determining the efficiency of the  services quality provided by the bank branches manner which reflect the extent of utilization of a

... Show More
View Publication Preview PDF
Crossref