In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Study of determining the optimal future field development has been done in a sector of South Rumaila oil field/ main pay. The aspects of net present value (economic evaluation) as objective function have been adopted in the present study.
Many different future prediction cases have been studied to determine the optimal production future scenario. The first future scenario was without water injection and the second and third with 7500 surface bbls/day and 15000 surface bbls/day water injection per well, respectively. At the beginning, the runs have been made to 2028 years, the results showed that the optimal future scenario is continuing without water in
Today, dimethyl ether (DME) is changing to ordinarily worn as a superb aerosol propellant and refrigerant for its eco-friendly characteristics. Lately, with the development of novel chemical energy in the coal industries, it has become a fascinating field of research as an alternative green fuel for diesel machines due to the high cetane number. The DME synthesis processes include catalytic dehydrating methanol in an adiabatic fixed-bed reactor. In this study, to investigate the chemical conditions of the methanol dehydration reaction, CFD simulations of the adiabatic reactor have been assessed. The advantage of the work is a sensitivity analysis was run to find the effect of pressure, kinetics, and velocity on the reactor performan
... Show MoreA 3D velocity model was created by using stacking velocity of 9 seismic lines and average velocity of 6 wells drilled in Iraq. The model was achieved by creating a time model to 25 surfaces with an interval time between each two successive surfaces of about 100 msec. The summation time of all surfaces reached about 2400 msec, that was adopted according to West Kifl-1 well, which penetrated to a depth of 6000 m, representing the deepest well in the study area. The seismic lines and well data were converted to build a 3D cube time model and the velocity was spread on the model. The seismic inversion modeling of the elastic properties of the horizon and well data was applied to achieve a corrected veloci
... Show MoreAccording to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
Presupposition is the background belief that is known by both the speaker and the addressee, it is tied to particular words and aspects of the surface structure that act as linguistic triggers. The present study aims at investigating whether Iraqi fourth -year university students are able to recognize the English presuppositions through the meaning of these linguistic triggers .To fulfil the basic requirements of the study, the researcher has conducted a test . The results of the study have validated the hypothesis of the work and it is found that the linguistic triggers are important tools in recognizing presuppositions.
The existing study aimed to assess four soil moisture sensors’ capacitive (WH51 and SKU: S EN0193) and resistive (Yl69 and IC Station) abilities, which are affordable and medium-priced for their accuracy in six common soil types in the central region of Iraq. The readings’ calibration for the soil moisture sensor devices continued through two gravimetric methods. The first depended on the protocols’ database, while the second was the traditional calibration method. The second method recorded the lowest analysis error compared with the first. The moderate-cost sensor WH51 showed the lowest standard error (SE), MAD , and RMSE and the highest R² in both methods. The performance accuracy of WH51 was close to readings shown by the manufac
... Show More