In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Background: Hypothyroidism is the most abundant thyroid disorder worldwide. For decades, levothyroxine was the main effective pharmacological treatment for hypothyroidism. A variety of factors can influence levothyroxine dose, such as genetic variations. Studying the impact of genetic polymorphisms on the administration of medications was risen remarkably. Different genetic variations were investigated that might affect levothyroxine dose requirements, especially the deiodinase enzymes. Deiodinase type 2 genetic polymorphisms’ impact on levothyroxine dose was studied in different populations. Objective: To examine the association of the two single nucleotide polymorphism (SNP)s of deiodinase type 2 (rs225013 and rs225014) and le
... Show MoreThe aim of this study to determine the genetic distance and relationship among some Iraqi date palm cultivars by using the Random Amplified Polymorphic DNA (RAPD) technique. Molecular analysis was performed by using 10 random primers. These primers produced 176 fragment lines across 14 cultivars, Of these, 166 or 94.3% were polymorphic. The size of the amplified bands ranged between 200-2250 bp. The genetic polymorphism value of each primer was determined and ranged between 7.5-16.9%. In terms of unique banding patterns, the most characteristic banding pattern was for the Barhee cultivar with primer OP-M06 and for the Khadhrawy Mandily cultivar with primer OP-C02. Genetic distance values ranged from 0.868 to 0.125 among studied date palm
... Show MoreAnkylosing spondylitis (AS) is a common, highly heritable inflammatory arthritis affecting primarily the spine and pelvis. This study was aimed to investigate the relationship between the rs27044 polymorphism in Endoplasmic reticulum aminopeptidase-1 (ERAP-1) with the susceptibility and severity of AS correlated with some biochemical markers such as hematological parameter (Erythrocytes sedimentation rate (ESR)) and immunological parameters (C-reactive protein (CRP), Human leukocyte antigen-B27 (HLA-B27), Interlukin-6 (IL-6) and Interlukin-23 (IL-23)), and oxidative stress parameters (Glutathione (GSH) and Malondialdehyde (MDA)) in a sample of Iraqi population. A total of 60 blood samples were collected from AS patients requited Rhe
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important
In this research, a qualitative seismic processing and interpretation is made up
through using 3D-seismic reflection data of East-Baghdad oil field in the central part
of Iraq. We used the new technique, this technique is used for the direct hydrocarbons
indicators (DHI) called Amplitude Versus Offset or Angle (AVO or AVA) technique.
For this purposes a cube of 3D seismic data (Pre-stack) was chosen in addition to the
available data of wells Z-2 and Z-24. These data were processed and interpreted by
utilizing the programs of the HRS-9* software where we have studied and analyzed
the AVO within Zubair Formation. Many AVO processing operations were carried
out which include AVO processing (Pre-conditioning for gathe
This paper calculated the Duration Magnitude (MD) equation using data from the Iraqi Meteorological Organization and seismology (IMOS). It is an empirically determined equation and expressed as:
The epicentral distance and local geological conditions affect the duration of the coda. The data is obtained from 7 seismic stations in the network. The new proposed duration magnitude equation results from applying linear regression analysis to the data of a seismic signal duration with correlation coefficient R2=0.76; and a standard deviation value of 0.049. Station corrections indicated by Sc are also specified for the seismic stations that range from -0.024 to + 0.02.
The physical and elastic characteristics of rocks determine rock strengths in general. Rock strength is frequently assessed using porosity well logs such as neutron and sonic logs. The essential criteria for estimating rock mechanic parameters in petroleum engineering research are uniaxial compressive strength and elastic modulus. Indirect estimation using well-log data is necessary to measure these variables. This study attempts to create a single regression model that can accurately forecast rock mechanic characteristics for the Harth Carbonate Formation in the Fauqi oil field. According to the findings of this study, petrophysical parameters are reliable indexes for determining rock mechanical properties having good performance p
... Show MoreThe objective of this research is to select the most suitable drilling location of new groundwater exploration wells, with a decision-making tool from Geographic Information System (GIS). The optimum location will be evaluated base on the hydro-geoelectrical parameter derived from Vertical Electrical Sound (VES) including Longitudinal Conductance, the thickness of the aquifer, the apparent resistivity and Transmissivity. From the Geo-electrical method (VES) the finds shows that the aquifers in the study area have Apparent Resistivity ranging from 0.32 to 40.24 Ωm, Thickness between 0.21 m to 15.06 m, Longitudinal Conductance ranging from 0.006 to 10.246Ω-1 and Transmissivity ranging from 0.14 to
... Show More