HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
Different bremsstrahlung spectra from tungsten anode x-ray tube generated at 30, 40 and 50 kV have been examined theoretically and experimentally for an attempt to find a most suitable spectrum to radiograph a test object of 0.01 cm thickness of Cu and Ag. The high contrast using this suitable spectrum is demonstrated and the possible effects of fluorescent radiation are discussed.
The current research aims to identify the fear of intimacy and post-traumatic stress disorder among Yazidi women and the correlation between them. To achieve the objectives of the research, the researcher adopted the Descutner, 1991 & (Thelen) scale, which consisted of (35) items. The researcher also adopted the post-traumatic stress disorder scale for (Davidson, 1995) translated by (Abdul Aziz Thabet), which consists of (17) items. These two scales were administered to a sample of (200) individuals. Then, the researcher analyzes the data using the Statistical Package for Social Sciences (SPSS). The results showed that the research sample of Yazidi women has a fear of intimacy. The research sample of Yazidi women is characterized by
... Show MoreAn anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological
... Show More