In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The properties of capturing of peristaltic flow to a chemically reacting couple stress fluid through an inclined asymmetric channel with variable viscosity and various boundaries are investigated. we have addressed the impacts of variable viscosity, different wave forms, porous medium, heat and mass transfer for peristaltic transport of hydro magnetic couple stress liquid in inclined asymmetric channel with different boundaries. Moreover, The Fluid viscosity assumed to vary as an exponential function of temperature. Effects of almost flow parameters are studied analytically and computed. An rising in the temperature and concentration profiles return to heat and mass transfer Biot numbers. Noteworthy, the Soret and Dufour number effect resul
... Show Moreتعد أبي- سمتي واحدة من أهم النساء التي لعبت دوراً هاماً في الحياة الاقتصادية في عصر أور الثالثة (2112-2004 ق.م)، فقد برزت خلال حكم زوجها الملك أمار-سين (2046-2038 ق.م) وحكم الملك شو-سين (2037-2029 ق.م) وكان لها دور أداري هام في النصوص الاقتصادية فقد ظهرت في عمليات الأستلام وتسليم الماشية والنفقات والمدخولات، فهي على مايبدو كانت مسؤولة عن حظيرة أو مؤسسة ما خلال حكم زوجها وأخيه ومن أشهر تلك الحظائر كانت (حظيرة دريهم) التي كانت تحت
... Show MoreThe study aims to diagnose the levels of total costs borne by the Diyala State Company, then estimate and analyze the quantitative relationship between the different items of these costs, in addition to the impact of the productive activity on them. This was done by choosing the different variables affecting the costs and their different items for the company under study, and relying on the data issued by the company during the period (2002-2021), based on a methodology that combines the descriptive and econometric methods in order to estimate and analyze the cost function in the concerned company. According to the estimated function of the costs of the company under study, the study concluded that the value of production affects the total
... Show MoreThe process of doing many kinds of industries , crafts , professions around Islamic Arabian State , they enable us to say that Arab Muslims over their homelands had been occupied various types of crafts and manufacturing before emergence Islam . Moreover Islam encouraged to work within manufacture field . And These matters were clarified through verses of the Holy Qur’an and honored prophetic guidance ( Sunna ) . Whereas Arab Muslims applied principle “ Free of Business “ . They admitted to different social groups such as pact – fellows people to profession or craft which they desire to work . We have to not forget that Arab Muslims had broken all restraints and shackles which had restricted the worker bef
... Show MoreEstimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling the Symmetric gray scale texture image and estimating by using
... Show MoreThe goal of this research to identify a set of criteria that can be measured on the basis of which the effectiveness of the application of the Balanced Scorecard in the Jordanian Public Institutions in order to identify the basic requirements to ensure the application of balanced performance measures. The study population consisted of the staff of the Public Institution for Social Security - Irbid of directors of departments and heads of departments and administrative staff, was the use of a random sample of (50) an employee and the employee. The questionnaire was used as a tool to collect data, and as a result of subjecting these standards for the field test and the use of statistical analysis tools to the results of the study c
... Show MoreIn this study, we focused on the random coefficient estimation of the general regression and Swamy models of panel data. By using this type of data, the data give a better chance of obtaining a better method and better indicators. Entropy's methods have been used to estimate random coefficients for the general regression and Swamy of the panel data which were presented in two ways: the first represents the maximum dual Entropy and the second is general maximum Entropy in which a comparison between them have been done by using simulation to choose the optimal methods.
The results have been compared by using mean squares error and mean absolute percentage error to different cases in term of correlation valu
... Show MoreAbstract
There has been a heated controversy over the role the financial policy plays and how sufficient it is in affording the financial burden. This burden is known as the operational current expenses which the governments of various countries mainly afford, despite the discrepancy in the government’s economic policy. After the deterioration and deficit in the state budget in all countries nowadays, it was necessary to find an appropri
... Show MoreBackground: Appreciation of the crucial role of risk factors in the development of coronary artery disease (CAD) is one of the most significant advances in the understanding of this important disease. Extensive epidemiological research has established cigarette smoking, diabetes, hyperlipidemia, and hypertension as independent risk factors for CADObjective: To determine the prevalence of the 4 conventional risk factors(cigarette smoking, diabetes, hyperlipidemia, and hypertension) among patients with CAD and to determine the correlation of Thrombolysis in Myocardial Infarction (TIMI) risk score with the extent of coronary artery disease (CAD) in patients with unstable angina /non ST elevation myocardial infarction (UA/NSTEMI).Methods: We
... Show MoreMultiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain
... Show More