In recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to search
the distributed documents in a descending order with respect to their relevance
documents and the contents of files be retrieved. To do so, each data owner builds
its own searchable index, and associates with each document in that index its weight
score, which facilitate document ranking. To ensure the privacy of these weights,
utilized the ranking. While preserving their capability to perform the ranking process
and to conducted several empirical analyses on a real dataset, all programs needed to
the propose system written using Matlab language.
Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreIt is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreInformation about soil consolidation is essential in geotechnical design. Because of the time and expense involved in performing consolidation tests, equations are required to estimate compression index from soil index properties. Although many empirical equations concerning soil properties have been proposed, such equations may not be appropriate for local situations. The aim of this study is to investigate the consolidation and physical properties of the cohesive soil. Artificial Neural Network (ANN) has been adapted in this investigation to predict the compression index and compression ratio using basic index properties. One hundred and ninety five consolidation results for soils tested at different construction sites
... Show MoreThe denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing. Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds. This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin
... Show MoreSoil suction is one of the most important parameters describing the moisture condition of unsaturated soils. The measurement of soil suction is crucial for applying the theories of the engineering behavior of unsaturated soils.
The filter paper method is one of the soil suction measurement techniques In this paper, five soil samples were collected from five sites within Baghdad city – al-Rasafa region. These soils have different properties and they were prepared at different degrees of saturation. For each sample, the total and matric suction were measured by the filter paper method at different degrees of saturation. Then correlations were made between the soil properties and the total and matric suction. It was concluded that the
Karbala province was one of the most important areas in Iraq and considered an
economic resource of vegetation such as trees of fruits, sieve and other vegetation.
This research aimed to utilize change detection for investigating the current
vegetation cover at last three decay. The main objectives of this research are collect
a group of studied area (Karbala province) satellite images in sequence time for
the same area, these image captured by Landsat (TM 1995, ETM+ 2005 and
Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such as atmosphere
correction and rectification has been done. Mosaic model between the parts of
studied area was performing. Gap filling consider being very important step has
be
This paper deals with an up to date problem for oil and gas industry- separation of the gas -fluid fogs. Here is described the worked out physical model of the gas movement process in the sections of the inertial filtering (IF) gas separators. One can find the mathematical model for research of the fields of velocities and pressures in the inertial curvilinear channel. The main simplifications and assumptions are explained. This mathematical model has been made using mathematical program Maple and it is received the 3-d graphic of the distribution componential speed parts in the channel and also 2-d graphics at the channel sectional view when the flow is flat. The new method for gas - fluid systems separation is suggested.
Unsaturated soil can raise many geotechnical problems upon wetting and drying resulting in swelling upon wetting and collapsing (shrinkage) in drying and changing in the soil shear strength. The classical principles of saturated soil are often not suitable in explaining these phenomena. In this study, expansive soil (bentonite and sand) were tested in different water contents and dry unit weight chosen from the compaction curve to examine the effect of water content change on soil properties (swelling pressure, expansion index, shear strength (soil cohesion) and soil suction by the filter paper method). The physical properties of these soils were studied by conducting series of tests in laboratory. Fitting methods
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show More