In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIntended for getting good estimates with more accurate results, we must choose the appropriate method of estimation. Most of the equations in classical methods are linear equations and finding analytical solutions to such equations is very difficult. Some estimators are inefficient because of problems in solving these equations. In this paper, we will estimate the survival function of censored data by using one of the most important artificial intelligence algorithms that is called the genetic algorithm to get optimal estimates for parameters Weibull distribution with two parameters. This leads to optimal estimates of the survival function. The genetic algorithm is employed in the method of moment, the least squares method and the weighted
... Show MoreThe study was conducted at the fields of the Department of Horticulture and Landscape Gardening, College of Agriculture, University of Baghdad " Abu Ghraib" during the growing seasons 2013-2014 to Evaluate the Vegetative growth , yield traits and genetic parameter of some tomato mutants. Results showed significantly increased of plant height in M6-2 mutant 245cm in Comparison with M6- 3 130 cm . M6-4 mutant significantly increasing of floral clusters 13 . Mutant M6-3 showed significantly increasing the average of, fruit weight 125.9g and plant yield 7.17 kg.plant-1 as comparison with M6-2 which showed decreasing of average of fruit weight and plant yield 79.40g and 4.38 kg.plant-1 respectively. Also results showed the highest Genetic variat
... Show MoreThe role of transmembrane protease serine 2(TMPRSS2) in prostate carcinogenesis relies on overexpression of ETS transcription factors. The aim of this article was to investigate the association of TMPRSS2 polymorphism (rs12329760 (C\T)) with prostate cancer (PCa) in sample of Iraqi patients. One hundred and two individuals were involved in this study for the period from February – 2019 to February – 2020. The sample type was formalin fixed paraffin embedded tissue samples (FFPE), which involved fifty-six samples of pre-diagnosed patients with prostate cancer, aged between 48 and 86 years, and forty-six samples were found to be controls (healthy group) dependent on Prostate Gland integrity, which is the same age as in a group o
... Show MoreIntroduction and Aim: Kruppel Like Factor 14 (KLF14) gene plays an important role in metabolic illnesses and is also involved in the regulation of many other biological processes. This study's objective was to determine whether or not the KLF14 single-nucleotide-polymorphism (SNP) known as rs972283 was linked to an increased risk of peptic ulcer disease in the population that was being investigated. Materials and Methods: Participants in this study included 71 people who had been diagnosed with peptic ulcers and 50 people who were considered to be healthy controls. In order to genotype the KLF14 SNP rs972283, an amplification refractory mutation system-polymerase chain reaction (ARMS-PCR) was carried out, and the PCR results were
... Show MoreCommon walnut (
In this study, geopolymer mortar was designed in various experimental combinations employing 1% micro steel fibers and was subjected to different temperatures, according to the prior works of other researchers. The geopolymer mortar was developed using a variety of sustainable material proportions (fly ash and slag) to examine the influence of fibers on its strength. The fly ash weight percentage was 50%, 60%, and 70% by slag weight to study its effect on the geopolymer mortar's properties. The optimal ratio produced the most significant results when mixed at a 50:50 ratio of fly ash and slag with 1% micro steel fibers at curing temperature 240oC for 4 hours through two days. The compressive strength of the geopolymer mortar increas
... Show MoreCorrosion experiments were carried out to investigate the effect of several operating parameters on the corrosion rate and corrosion potential of carbon steel in turbulent flow conditions in the absence and presence of sodium benzoate inhibitor using electrochemical polarization technique. These parameters were rotational velocity (0 - 1.57 m/s), temperature (30oC – 50oC), and time. The effect of these parameters on the corrosion rate and inhibition efficiency were investigated and discussed. It was found that the corrosion rate represented by limiting current increases considerably with increasing velocity and temperature and that it decreased with time due to the formation of corrosion product layer. The corrosion potential shifted t
... Show More