In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The compound 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD), an environmental contaminant, is a potent ligand for aryl hydrocarbon receptor (AhR). In the current study, we made an exciting observation that naive C57BL/6 mice that were exposed i.p. to TCDD showed massive mobilization of myeloid-derived suppressor cells (MDSCs) in the peritoneal cavity. These MDSCs were highly immunosuppressive and attenuated Con A–induced hepatitis upon adoptive transfer. TCDD administration in naive mice also led to induction of several chemokines and cytokines in the peritoneal cavity and serum (CCL2, CCL3, CCL4, CCL11, CXCL1, CXCL2, CXCL5, CXCL9, G-CSF, GM-CSF, VEGF, and M-CSF) and chemokine receptors
The research aims to show the effect of some short-term debt instruments (central treasury transfers, cash credit granted to the government by commercial banks) on the production of the wheat crop in Iraq, through its effect on money supply during the period (1990-2018), As the study includes two models according to the statistical program (Eviews9), the first model included measuring the effect of short-term debt instruments on money supply, and the second measuring the extent of the money supply's impact on Wheat crop production, as the results of the standard analysis showed that the short-term debt instruments used in the model were Significant effect on wheat crop production indirectly through its effect on money supply, As
... Show MoreFinding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved. In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show Moreسنقوم في هذا البحث باشتقاق توزيع الطلب خلال فترة الانتظار لنظام سيطرة على الخزين يخضع فيه الطلب لتوزيع گاما فيما يخضع وقت الانتظار للتوزيع اللوغايتمي الطبيعي، كما سيتم استخراج العزوم الأساسية لهذا المتغير ، الضرورية بدورها لاستخراج بعض مؤشرات النظام المذكور.
المصطلحات المستخدمة: التكامل المحيط، المستوي المركب، تكامل هانكيل، مستوى إعادة الطلب، الوقاية.
Quantitative real-time Polymerase Chain Reaction (RT-qPCR) has become a valuable molecular technique in biomedical research. The selection of suitable endogenous reference genes is necessary for normalization of target gene expression in RT-qPCR experiments. The aim of this study was to determine the suitability of each 18S rRNA and ACTB as internal control genes for normalization of RT-qPCR data in some human cell lines transfected with small interfering RNA (siRNA). Four cancer cell lines including MCF-7, T47D, MDA-MB-231 and Hela cells along with HEK293 representing an embryonic cell line were depleted of E2F6 using siRNA specific for E2F6 compared to negative control cells, which were transfected with siRNA not specific for any gene. Us
... Show MoreResearch on the automated extraction of essential data from an electrocardiography (ECG) recording has been a significant topic for a long time. The main focus of digital processing processes is to measure fiducial points that determine the beginning and end of the P, QRS, and T waves based on their waveform properties. The presence of unavoidable noise during ECG data collection and inherent physiological differences among individuals make it challenging to accurately identify these reference points, resulting in suboptimal performance. This is done through several primary stages that rely on the idea of preliminary processing of the ECG electrical signal through a set of steps (preparing raw data and converting them into files tha
... Show More