In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Research includes evaluation of projects implemented and which entered into trial operation period in accordance with the evaluation criteria and of (cost, quality and time) to determine the size deviations gap for the sample of projects during the years of assessment (2011-2012-2013-2014) of each of the three evaluation criteria, and then followed by a calculation the size of the overall gap to the problem based on the research problem to determine deviations from the specific implementation of each project by answering several questions to answer turns out the reasons for these deviations occur.
The importance of research Focus on the evaluation of received projects from contractors executing the projec
... Show MoreThe research aims to a statement of specificity of the Controller of (academic achievement, specialty, job title, length of service, Gender) and its impact on performance, Through a proposed appraisal form includes three main axes and each axis including several specialized elements in the supervisory work in form (check list). as is the importance of research to enable officials of oversight bodies financial identify and diagnose performance Controller through what has this observer of the process of scientific properties when performing supervisory work. Be summarized problem of the research that the lack of regulatory institution with the Controller interesting in terms of the necessary characteristics and requirements and inv
... Show MoreKS Ismaeil, BR Jawad, Journal of Physical Education, 2023
Good governance of service quality through the adoption of sustainable energy the study of A1- Karkh historic center of in Baghdad city
Acute Respiratory Distress Syndrome (ARDS) causes up to 40% mortality in humans and is difficult to treat. ARDS is also one of the major triggers of mortality associated with coronavirus-induced disease (COVID-19). We used a mouse model of ARDS induced by Staphylococcal enterotoxin B (SEB), which triggers 100% mortality, to investigate the mechanisms through which Δ9-tetrahydrocannabinol (THC) attenuates ARDS. SEB was used to trigger ARDS in C3H mice. These mice were treated with THC and analyzed for survival, ARDS, cytokine storm, and metabolome. Additionally, cells isolated from the lungs were used to perform single-cell RNA sequencing and transcriptome analysis. A database analysis of human COVID-19 patients was also performed t
... Show More
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MoreIsobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo
... Show More