Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show MoreRecently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural
... Show MoreIs in this research review of the way minimum absolute deviations values based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.
In this paper we study the selection of cognitive elements and criteria of the inflectional structure of the Russian and Arabic languages in the process of speech communication. Phonetic-physiological principle is the main parameter by which the elements and criteria of cognitive activity in the presented study are distinguished. On the basis of the above mentioned parameter, we select the investigated criteria and elements. The first criterion is semantic, reflects the accordance of the elements of thinking to sound combinations in the studied languages, and allows us to distinguish the second criterion – morphonological. The second criterion depends on the phonetic changes of these combinations occurring in the process of speech activit
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe other is a problematic concept and can be achieved only by the existence of difference and differentiation between human groups in views and views, the other is out of the ego, which is different religiously, politically, socially, culturally, place and language.
We take from the Iraqi feminist novel analytical field to reflect the image of the other in the novelist world, and the models chosen for the study are: the novel granddaughter of American novelist Anaam Kjie Ji, and novel how the sky seemed close to the novelist Batoul al-Khudairi, and novel when you wake up the smell of novelist Dni Ghali, and the rope of the umbilical and the novel Shufuni Shufuni The novel by Samira Al-Manea, the novelist of the novelist Alia Mamdouh,
