Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.
In this ˑwork, we present theˑ notion of the ˑgraph for a KU-semigroup as theˑundirected simple graphˑ with the vertices are the elementsˑ of and weˑˑstudy the ˑgraph ofˑ equivalence classesˑofˑ which is determinedˑ by theˑ definition equivalenceˑ relation ofˑ these verticesˑ, andˑ then some related ˑproperties areˑ given. Several examples are presented and some theorems are proved. Byˑ usingˑ the definitionˑ ofˑ isomorphicˑ graph, ˑwe showˑ thatˑ the graphˑ of equivalence ˑclasses ˑand the ˑgraphˑof ˑa KU-semigroup ˑ areˑ theˑ sameˑ, in special cases.
In this research we prepared shiff bases unilateral claw( benzyl imine aniline ) and Bilateral claw ( benzayal-2-imine phenol ) in high purity reach to 98% , which it's prepared from aromatic amine with aldehydes, it's solid,thermosetting, not dissolved in water in general. Diagnosed prepared article by using infra red spectroscopy (IR) which shows azomethen grop at 1640cm-1 At this diagnosis we suggest tetra headral mechanism in this Circumstances For a reaction.
So far synthesis of Gonadotropin Releasing Hormone (GnRH) analogues reported in the literature has clarified some aspects of structural activity of the naturally released GnRH. As a part of continuing efforts for further understanding of this relationship, the present investigation was undertaken which involved synthesis and biological evaluation of two GnRH analogues, firstly, by replacement of the amino acid L-Argenine in the 8th position at the backbone structure of the natural hormone by the amino acid D-Alanine; and secondly, by replacement of the amino acid L-Glycine in the 10th position by D-Alanine also at the backbone structure of the nature hormone, to obtain the following analogues respectively:
P
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The Atoms in Molecules (AIM) analysis for triosmium cluster, which contains trihydridede, carbon, carbonyl and 2-methylbenzothiazolide ligands, [Os3(µ-H)3(µ3-ɳ2-CC7H3(2-CH3)NS)(CO)8] is reported. Bonding features in this cluster has been analyzed based on QTAIM ("Quantum Theory of Atoms in Molecules") in this work. The topological indices derived from electron density of relevant interactions in triosmium compound have been studied. The major interesting point of the AIM analyses is that the core of part (Os3H3) reveals the absence of any critical points and bond paths connecting any pairs of O
... Show MoreIn wide range of chemical, petrochemical and energy processes, it is not possible to manage without slurry bubble column reactors. In this investigation, time average local gas holdup was recorded for three different height to diameter (H/D) ratios 3, 4 and 5 in 18" diameter slurry bubble column. Air-water-glass beads system was used with superficial velocity up to 0.24 m/s. the gas holdup was measured using 4-tips optical fiber probe technique. The results show that the axial gas holdup increases almost linearly with the superficial gas velocity in 0.08 m/s and levels off with a further increase of velocity. A comparison of the present data with those reported for other slurry bubble column having diameters larger than
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
The laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2
This study was conducted to estimate some heavy metals cadmium, lead, nickel and iron in 15 samples of Iraqi honey with 3 replicates for each sample which were collected from apiaries near potential contamination areas in five Iraqi governorates, including Baghdad, Karbala, Babylon, Diyala and Salah al-Din. The atomic absorption technique was used to estimate the concentrations of heavy metals, the results showed that there were significant differences at (P≤0.05) between the concentrations of these elements in the honey samples, the highest concentrations of cadmium 0.123 mg/kg were recorded in Baghdad, near the petrochemical production complex, lead 4.657 mg/kg and nickel 0.023 mg/kg in Babylon near the power plant, iron was
... Show MoreThis study relates to the estimation of a simultaneous equations system for the Tobit model where the dependent variables ( ) are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method and Two- Stage limited dependent variables(2SLDV) method to get of estimators that hold characteristics the good estimator .
That is , parameters will be estim
... Show More