In recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to search
the distributed documents in a descending order with respect to their relevance
documents and the contents of files be retrieved. To do so, each data owner builds
its own searchable index, and associates with each document in that index its weight
score, which facilitate document ranking. To ensure the privacy of these weights,
utilized the ranking. While preserving their capability to perform the ranking process
and to conducted several empirical analyses on a real dataset, all programs needed to
the propose system written using Matlab language.
Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreRecently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a
... Show MorePotential health and environmental effects of nanoparticles need to be thoroughly assessed before their widespread commercialization. The present investigation was planned with the aims to determine the effects of gold nanoparticles (GNPs) on blast (BI) and mitotic (MI) indices of cultured lymphocytes. The results revealed that BI (50.3±2.3, 30.2±1.9, 10.5±0.7 and 0.0%, respectively) and MI (70.1±2.9, 20.4±1.1, 5.3±0.1 and 0.0%, respectively) showed a gradual decreased percentage as the concentration of GNPs was increased from 0.085 to 0.66 µg/mL, and the difference was significant compared to control culture (81.6±2.5 and 90.2±3.7%, respectively). A maximum inhibition of BI and MI was occurred at the concentration 0.66 µg/mL. In
... Show MoreThe study was conducted to measure diatom species diversity in the lotic ecosystem across the Wasit Province for 12 months. The quantitative study of diatoms (phytoplankton) was investigated in the Tigris river. The density of algae was ranged from 60989 cell×103/l to 112780.82 cell×103/l in the five sites. These algae were belonging to 39 genera. The richness index values ranged from 1.53 at site 5 in January 2016 to 6.34 at site 1 and June2015. Shannon-Weiner diversity index (H´) was 2.33 in February 2016 and 3.72 in June 2015 both values at site 3, whereas Evenness index was 0.54 at site 5 in March2016 and 0.98 at site 1 in both August2015 and May2016. The lack of homogeneity of the appearance of species indicates the dominance of a
... Show MoreField of translation is sampled with many types of translation, such as the literary, scientific, medical, etc. The translation of grammatical aspects has always been with difficulties.
Political translation is the focus here. There are many general problems faced by translators when translating political texts from Arabic into Spanish. The aim here is to clarify the definition of functions or terms within the text, and to arrive at the correct from of translation of such texts from Spanish into Arabic. It is worth mentioning that the paper is of two parts: the first exemplifies what is meant by translation, the prerequisites of a translator, along with mentioning the methods followed&nbs
... Show MoreThis paper describes the geotechnical properties of Al-Ammarah soil of Ammarah city in Messan Governorate-southern parts of Iraq. Data and other information taken from numbers of geotechnical reports that performed under the supervision of Consulting Engineering Bureau of Baghdad University. This research is devoted to study the correlation between different physical properties such as (LL, PI, LI, n,t, e) with different mechanical properties such as (qu, cc, cs, SPT). The correlation is verified using simple regression analysis. From the regression results it was found that there is direct correlation between different parameters. By using the correlation-with some information- preliminary investigation stages and studies of any s
... Show MoreThe variation of compression index Cc and swelling index Cs with the degree of saturation S was studied on unsaturated and fully saturated soils for different degrees of saturation (100%, 91%, 85%, 75%, 60%), several mathematical equations were found to describe these relationships, these equations can be used to predict settlement during the consolidation process in unsaturated and fully saturated soils.
Voice denoising is the process of removing undesirable voices from the voice signal. Within the environmental noise and after the application of speech recognition system, the discriminative model finds it difficult to recognize the waveform of the voice signal. This is due to the fact that the environmental noise needs to use a suitable filter that does not affect the shaped waveform of the input microphone. This paper plans to build up a procedure for a discriminative model, using infinite impulse response filter (Butterworth filter) and local polynomial approximation (Savitzky-Golay) smoothing filter that is a polynomial regression on the signal values. Signal to noise ratio (SNR) was calculated after filtering to compare the results
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.