Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.
Optical spectrum of SN1987A at days 4 from the explosion and its light curve through the first 1444 days after the explosion have been studied. The hydrogen lines present in the spectrum confirms the general characteristics of Type II SN that occur due to core collapse of massive star. Each of the total mass ejected from the explosion and the amount of the total mass of Nickel radioactive isotopes that produced during the explosion as well as the initial velocity of the ejecta and the explosion energy have been determined and compared with different observed and calculated models obtained by different researchers and it’s found that, about 8.8 Mʘ of the progenitor envelope mass had been ejected during the explosion and it’s mixed with
... Show MoreThe Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (c
A procedure for the mutual derivatization and determination of thymol and Dapsone was developed and validated in this study. Dapsone was used as the derivatizing agent for the determination of thymol, and thymol was used as the derivatizing agent for the determination of Dapsone. An optimization study was performed for the derivatization reaction; i.e., the diazonium coupling reaction. Linear regression calibration plots for thymol and Dapsone in the direct reaction were constructed at 460 nm, within the concentration range of 0.3-7 μg ml-1 for thymol and 0.3-4 μg ml-1 for Dapsone, with limits of detection 0.086 and 0.053 μg ml-1, respectively. Corresponding plots for the cloud point extraction of thymol and Dapsone were constructed
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThe present work presents design and implementation of an automated two-axis solar tracking system using local materials with minimum cost, light weight and reliable structure. The tracking system consists of two parts, mechanical units (fixed and moving parts) and control units (four LDR sensors and Arduino UNO microcontroller to control two DC servomotors). The tracking system was fitted and assembled together with a parabolic trough solar concentrator (PTSC) system to move it according to information come from the sensors so as to keep the PTSC always perpendicular to sun rays. The experimental tests have been done on the PTSC system to investigate its thermal performance in two cases, with tracking system (case 1) and without trackin
... Show MoreThe research aims to explain the role of cloud computing technology in facilitating the application of international financial reporting standards in Iraqi banks, by preparing a checklist that included a set of paragraphs to measure the level of application of IFRSs. In those banks and then the need to use cloud computing technology, and the researchers reached a set of conclusions, including, that cloud computing technology has a role in facilitating the application of international financial reporting standards in the banks, the research sample, because of the ease it provides in preparing and saving accounting information and the possibility of accessing it in any time and from any place where the Internet service is available. T
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More
