Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreBanks represents financial institutions that influence the economy of any country and their evolution and development is the need to seek all states , communities, maintain and control a guarantee of the beneficiaries investors and to promote confidence, so the specialized organizations trying to set principles and rules must be adhered to and are Basel (II) of the necessary effects to be introduced and work on their application. Banks exposed by various risks one of them operational risks that have multiple effects on the activity of the institution itself, as well as the national economy, so this study was to find out what those effects and to find solutions and appropriate proposals to avoid Iraqi banks from the effects of risk,
... Show MoreSynthetic polymers such as polyurethane are used widely in the field of biomedical applications such as implants or part of implant systems.
This paper focuses on the preparation of base polymer matrix composite materials by (Hand Lay-Up) method, and studying the effect of selected grain size (32, 53, 63, 75, and 90) µm of (Reenia) particles on some properties of the prepared composite.
Mechanical tests were used to evaluate the prepared system (Tensile, Compression, Impact, and Hardness) tests, and a physical test of (Water absorption %), and all tests were accomplished at room temperature.
Where results showed tensile test (maximum tensile strength and modulus of elasticity) high at small grain size while
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreIn this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called