Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However, the key generation process in our scheme has been done without any intervention from the certificate issuer and avoiding the risk of compromised CA. The Elliptic Curve Digital Signature Algorithm (ECDSA) has been used with the ECDH to handle the authentication of the key exchange. The proposed scheme is demonstrated on a big dataset of social networks. The scheme is analyzed based on security criteria that have been compared with the previous schemes to evaluate its performance.
In cognitive radio system, the spectrum sensing has a major challenge in needing a sensing method, which has a high detection capability with reduced complexity. In this paper, a low-cost hybrid spectrum sensing method with an optimized detection performance based on energy and cyclostationary detectors is proposed. The method is designed such that at high signal-to-noise ratio SNR values, energy detector is used alone to perform the detection. At low SNR values, cyclostationary detector with reduced complexity may be employed to support the accurate detection. The complexity reduction is done in two ways: through reducing the number of sensing samples used in the autocorrelation process in the time domain and through using the Slid
... Show MoreJournal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
To assess the total hip replacement patients’ knowledge of home – care regarding pain management, medication therapy, wound care, mobility limitation and complications may occur in the post hip replacement surgery, and to assess relationship between some variables such as, age level of education, sex & marital status with home- care knowledge. A descriptive study was used to assess the hip-replacement patient home-knowledge, a purposive sampling of (60) hip-replaced –patients were selected from Gazy Alhariri Hospital (central of surgical profession ) and Alwasity Hospital ( plastic surgery) , the questionnaire obtains two parts , part one, which included socio-demographical characteristics of the samp
... Show MoreOne of the most demanded studies is wind turbine site assessment. It is difficult to build a simulation program because of the many variables that affect the wind speed and direction. The procedure of this research depend on two approaches, the Wind Atlas Analysis model and the Inverse Distance Wait interpolation. These procedures give the estimated annual energy production for each turbine (V82) with 82m blades diameter at 70m hub heights. The output at this location for each turbine is about (4.3 GWh). The studied area is about 20x20km2 and could be plant at least 600 turbine and have about 2500 GWh of annual energy production.
N, N′- bis[4-hydroxy phenyl] pyromillitdiimide [II] was prepared from the corresponding diamic acid , which was transfered to its new ester by the reaction with chloroethyl acetate [III ], [III] was used to prepare the novel hydrazide derivative [IV] , which was allowed to react with several aldehydes to yield the hydrazones [V – IX]. All the new compounds were synthesized , and characterized by their melting points .HNMR for some of them1FTIR,C,H,N analysis and ,
N, N′- bis[4-hydroxy phenyl] pyromillitdiimide [II] was prepared from the corresponding diamic acid , which was transfered to its new ester by the reaction with chloroethyl acetate [III ], [III] was used to prepare the novel hydrazide derivative [IV] , which was allowed to react with several aldehydes to yield the hydrazones [V – IX]. All the new compounds were synthesized , and characterized by their melting points .HNMR for some of them1FTIR,C,H,N analysis and ,
In this study, lateral groundwater inflow was examined, according to the phenomena of groundwater mixing, groundwater flow and groundwater chemistry. The study region is composed of different aquifer systems; including karst-fracture media (Rattga-Jeed carbonates aquifer), fissure–porous media (Mullusi, Mullusi-Ubaid, Hartha-Rutba, and Digma-Tayarat aquifers) and porous media (Permo-carboniferous clastics rocks of Ga’ra aquifer).The aquifers are vertically super-imposed or of lateral contacts make open hydraulic connection between aquifers system. There is a severe shortage of water resources in the region because of rare precipitation and strong evapotranspiration. These conditions have hampered eco-environm
... Show MoreAn interpretative study of the two-dimensional seismic data of the Afaq area was conducted using the Petrel 2017 software. 2D seismic reflection sections are used to give a structural interpretation of Afaq structure based on synthetic seismogram and well log data. Three reflectors, Zubair, Yamama, and Gotina Formations, were selected. These reflectors are defined from well west kifl (wk-1), Where located adjacent to the study area. Structural maps of the Zubair, Yamama, and Gotnia formations are prepared and interpreted, including TWT maps, Average velocity maps, and depth maps. The studies concluded that the Afaq structure area does not contain main faults, but secondary faults with short and limited extensions
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More