In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show MoreColorectal cancer CRC is the third most commonly diagnosed cancer in males and the second in female, so it is a common and life-threatening disease serum of 48 males and 40 females suffering from CRC disease as group one (G1) without taking a chemotherapy dose, the same patients group tow (G2) after taking the first chemotherapy dose, while group three (G3) whose patients in (G1) and (G2) after second taking a chemotherapy dose. and group four (G4) consist of (30 males and 30 females) healthy Iraqi control. Results showed a significant increase in IL-17, IL-17RA and CEA in G1, while there was a significant decrease in vitamin D concentration in G1 than other groups, also there was positive (+ ve) significant correlation between IL-17 and CE
... Show More This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThis study is concerned measuri ng the concentration of some
ions l ike calci um, sodium, potassium, chlor, lithium, carbonate and bicarbonate in drinking and river water in AI-Muthana and AI-Basrah
cities_
These ions usually are found in normal water. When we take di!Ierent samples from different regions on the E uph rates river in Al Muthana and A1-Basrah cities we fou nd that the d rinking water in Al Basrah contains a high prccent from those ions. The low preccnt from those ions found in Arab river as compared with Euphrates river. This study
... Show MoreThis field experiment was conducted at Research Station B, Department of Horticulture and Landscape Engineering, College of Agricultural Engineering Sciences, University of Baghdad, Jadiriyah during the fall season of 2019-2020 to evaluate the effect of cultivation dates and soil fertilization source on the growth, yield and quality of broccoli. A split plot design within the RCBD design with three replicates was applied as the Max F1 hybrid broccoli seedlings were transferred to the field at two dates 25, Sep. 2019 and 15, Oct. 2019, which were symbolized as A and B, respectively, and occupied at the main plot. After two weeks of cultivation, the soil fertilizers were applied three times during the season in 20 days between each applicati
... Show More