Preferred Language
Articles
/
Sxctro0BVTCNdQwC3hjb
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize deduplication ratios. Our approach uses data deduplication to remove identical copies of the video. Our experimental results show significant storage savings, while providing strong level security

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 09 2021
Journal Name
Nanomaterials
Investigation of Heat Transfer Enhancement in a Triple Tube Latent Heat Storage System Using Circular Fins with Inline and Staggered Arrangements
...Show More Authors

Inherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,

... Show More
View Publication Preview PDF
Scopus (40)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2009
Journal Name
2009 Wri International Conference On Communications And Mobile Computing
Optimization of Cooperation Sensing Spectrum Performance
...Show More Authors

Cooperation spectrum sensing in cognitive radio networks has an analogy to a distributed decision in wireless sensor networks, where each sensor make local decision and those decision result are reported to a fusion center to give the final decision according to some fusion rules. In this paper the performance of cooperative spectrum sensing examines using new optimization strategy to find optimal weight and threshold curves that enables each secondary user senses the spectrum environment independently according to a floating threshold with respect to his local environment. Our proposed approach depends on proving the convexity of the famous optimization problem in cooperative spectrum sensing that stated maximizing the probability of detec

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jan 06 2022
Journal Name
Kuwait Journal Of Science
AVO analysis for high amplitude anomalies using 2D pre-stack seismic data
...Show More Authors

Amplitude variation with offset (AVO) analysis is an 1 efficient tool for hydrocarbon detection and identification of elastic rock properties and fluid types. It has been applied in the present study using reprocessed pre-stack 2D seismic data (1992, Caulerpa) from north-west of the Bonaparte Basin, Australia. The AVO response along the 2D pre-stack seismic data in the Laminaria High NW shelf of Australia was also investigated. Three hypotheses were suggested to investigate the AVO behaviour of the amplitude anomalies in which three different factors; fluid substitution, porosity and thickness (Wedge model) were tested. The AVO models with the synthetic gathers were analysed using log information to find which of these is the

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 08 2023
Journal Name
Iraqi Journal Of Laser
PDF Sensing and differentiation between normal flora and pathogenic of E.coli Bacteria using 410 nm diode laser
...Show More Authors

Abstract: Background: Optical biosensors offer excellent properties and methods for detecting bacteria when compared to traditional analytical techniques.  It allows direct detection of many biological and chemical materials.  Bacteria are found in the human body naturally non-pathogenic and pathologically, as they are found in other living organisms.  One of these bacteria is Escherichia coli (E. coli) which are found in the human body in its natural and pathogenic form. E.coli bacteria cause many diseases, including Stomach, intestines, urinary system infections, and others. The aim of this study: is sensing and differentiation between normal flora and pathogenic E.coli. Material and method:

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Iraqi Journal Of Physics
Monitoring Land Surface Temperature (LST) and Land Cover of Basra Province using Remote Sensing Technique and GIS
...Show More Authors

This study investigates the changes occurring in the province of Basra using geospatial methods and analyzes the variations in land surface temperature among the various types of land cover. For the months of July and December in the years 2013 and 2021, Landsat images were used in Landsat 8 OLI/TIRS, and satellite images were processed using ArcGIS 10.8 software. The study's categories for land use and land cover were generated through the application of supervised classification techniques, and the land surface temperature was calculated using data from a satellite sensor's brightness temperature. According to the study's findings, there has been an increase in urban areas (including barren land). From 2013 to 2021, a greater correlati

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Nov 05 2013
Journal Name
Wit Transaction On Ecology And The Environments, Wit, Press No. 11
Remote sensing of water quality index for irrigation usability of the Euphrates River
...Show More Authors

irrigation use at many stations along the Euphrates River inside the Iraqi lands and to try to correlate the results with the satellite image analyses for the purpose of making a colored model for the Euphrates that can be used to predict the quality classifications of the river for irrigation use at any point along the river. The Bhargava method was used to calculate the water quality index for irrigation use at sixteen stations along the river from its entrance to the Iraqi land at Al-Qaim in Anbar governorate to its union with the Tigris River at Qurna in Basrah governorate. Coordinates of the sixteen stations of the Euphrates River were projected at the mosaic of Iraq satellite image which was taken from LANDSAT satellite for bands 1, 2

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref