Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize deduplication ratios. Our approach uses data deduplication to remove identical copies of the video. Our experimental results show significant storage savings, while providing strong level security
Represent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreBackground: Mothers are considered as the key role in effect on child's dental behavior. So it is important to involve her in oral health promotion program to prevent early childhood dental caries from occurring in early age. Objectives: To identify the knowledge, practice and attitude of mothers about the oral health of their children. And to measure the change in oral hygiene of children aged (4-7) years old after one month of interventional program on their mothers. Type of study: Non-randomized interventional.Methods: Non-randomized interventional study for one month in Al Shaab area in Baghdad to 65 mothers who have children aged (4-7) years .A modified administrated questionnaire is given to assess mothers’ knowledge, practice an
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Internet of Things (IoT) contributes to improve the quality of life as it supports many applications, especially healthcare systems. Data generated from IoT devices is sent to the Cloud Computing (CC) for processing and storage, despite the latency caused by the distance. Because of the revolution in IoT devices, data sent to CC has been increasing. As a result, another problem added to the latency was increasing congestion on the cloud network. Fog Computing (FC) was used to solve these problems because of its proximity to IoT devices, while filtering data is sent to the CC. FC is a middle layer located between IoT devices and the CC layer. Due to the massive data generated by IoT devices on FC, Dynamic Weighted Round Robin (DWRR)
... Show MoreBackground: The prevalence of multidrug-resistant bacteria and their contribution to increased morbidity and mortality due to the difficult-to-treat diseases caused by these bacteria, has demonstrated a need to develop and use alternative antimicrobial agents to control multidrug-resistant bacteria. There has been a growing interest in medicinal plants and herbs and their extracts for the discovery of new natural therapeutic alternatives. Therefore, this current study aimed to know the antibacterial activity of aqueous and alcoholic extracts of the Sumac (Rhus coriaria L) fruits against multidrug-resistant clinical bacterial isolates and the effect of these extracts on biofilm production as an important virulenc
... Show MoreTetradentate complexes type [M (HL) 2] were prepared from the reaction of 2-hydroxy -1, 2-diphynel-ethanone oxime [H2L] and KOH with ( Mn II, Fe II, Co II, Ni II , Cu II and Hg II ), in methanol with (2:1) metal: ligand ratio. The general formula for Cu II and Mn II complexes are [M (HL) 2 Cl.H2O] K, for Co II [Co (HL) 2. H2O] and [M (HL) 2] for the rest of complexes. All compounds were characterised by spectroscopic methods, I.R, U.V-Vis, H.P.L.C, atomic absorption and conductivity measurements chloride content. From the data of these measurements, the proposed molecular structures for Fe II and Hg II complexes are tetrahedrals, while Mn II and Cu II complexes are octahedrals, Ni II complex adopting square planar structure and the complex
... Show MoreTetradentate complexes type [M (HL) 2] were prepared from the reaction of 2-hydroxy -1, 2-diphynel-ethanone oxime [H2L] and KOH with ( Mn II, Fe II, Co II, Ni II , Cu II and Hg II ), in methanol with (2:1) metal: ligand ratio. The general formula for Cu II and Mn II complexes are [M (HL) 2 Cl.H2O] K, for Co II [Co (HL) 2. H2O] and [M (HL) 2] for the rest of complexes. All compounds were characterised by spectroscopic methods, I.R, U.V-Vis, H.P.L.C, atomic absorption and conductivity measurements chloride content. From the data of these measurements, the proposed molecular structures for Fe II and Hg II complexes are tetrahedrals, while Mn II and Cu II complexes are octahedrals, Ni II complex adopting
... Show MoreGas and downhole water sink assisted gravity drainage (GDWS-AGD) is a promising gas-based enhanced oil recovery (EOR) process applicable for reservoirs associated with infinite aquifers. However, it can be costly to implement because it typically involves the drilling of multiple vertical gas-injection wells. The drilling and well-completion costs can be substantially reduced by using additional completions for gas injection in the oil production wells through the annulus positioned at the top of the reservoir. Multi-completion-GDWS-AGD (MC-GDWS-AGD) can be configured to include separate completions for gas injection, oil, and water production in individual wells. This study simulates