Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.
The modern teaching methods, and their importance in achieving the desired learning goals for the individual and the society, have been addressed, as it is necessary to develop the methods, ways and strategies used in the process of teaching the intermediate stages in the various fields in general and the field of physical education in particular, the importance of research is the effect of using the strategy of similarities in teaching some basic skills of basketball for students of the second intermediate. As for the problem of research, the researcher mentioned the lack of use of teachers’ strategy method similarities in the educational units because of its importance, and after study and analysis the researcher found it necessary to i
... Show MoreDapagliflozin is a novel sodium-glucose cotransporter type 2 inhibitor. This work aims to develop a new
validated sensitive RP-HPLC coupled with a mass detector method for the determination of dapagliflozin, its
alpha isomer, and starting material in the presence of dapagliflozin major degradation products and an internal
standard (empagliflozin). The separation was achieved on BDS Hypersil column (length of 250mm, internal
diameter of 4.6 mm and 5-μm particle size) at a temperature of 35℃. Water and acetonitrile were used as
mobile phase A and B by gradient mode at a flow rate of 1 mL/min. A wavelength of 224nm was selected to
perform detection using a photo diode array detector. The method met the
In this study, the dung beetles Aphodius (Bodilus) ictericus (Laicharting, 1781) and Aphodius (Planolinellus) vittatus Say, 1825 which belongs to the family of Aphodiidae (Order: Coleoptera) are redscribed here as to being found for the first time in Iraq.
The specimens were collected from different regions in the middle of Iraq; the main diagnostic characters and some morphological features of males were drawn and pictured.
ABSTRACT Backgrounds: Maxillary canine impaction is complicated and time consuming to treat, for being highly diverse in inclination and location; it may be a companied by root resorption of the neighboring teeth. CBCT has been used for its' diagnostic reliability in localization of impacted canine and revealing its' serious local complications. Objectives: Localization of maxillary impacted canine using cone beam computed tomography for assessment of angulation, distance from occlusal plane, alveolar width and proximity to adjacent teeth. Subjects and Methods: The study sample was 33 subjects 16 females and 17 males attended to Al-Wasitti general hospital in Baghdad city-Oral and maxillofacial radiology department for CBCT scan investigati
... Show MoreThe Iraqi construction industry suffers from many issues that lead to many design errors, clashes, delays and cost overruns. Therefore, applying constructability will prevent these issues from happening, as it has proven its positive effect in different projects around the world. The goal of this paper is to use building information modelling (BIM) to assess the constructability, provide the opportunities for the project stakeholders to choose the best constructable design alternative and find the affection of applying constructability on project cost. The practical side of this research consists of two parts: in the first part, 37 factors are collected from the literature review as factors that effect on constructability. After tha
... Show MoreAbstract. This study presents experimental and numerical investigation on the effectiveness of electrode geometry on flushing and debris removal in Electrical Discharge Drilling (EDD) process. A new electrode geometry, namely side-cut electrode, was designed and manufactured based on circular electrode geometry. Several drilling operations were performed on stainless steel 304 using rotary tubular electrodes with circular and side-cut geometries. Drilling performance was characterized by Material Removal Rate (MRR), Electrode Wear Rate (EWR), and Tool Wear Ratio (TWR). Dimensional features and surface quality of drilled holes were evaluated based on Overcut (OC), Hole Depth (HD), and Surface Roughness (SR). Three-dimensional
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show More