In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Entrepreneurial culture has emerged as a powerful means of development in many countries of the world and can be regarded as a source of innovation and as a key to sustainable unemployment.
The national economic outlook, which was established by the High Commission for Planning, predicts economic growth of only 2.6% in 2016, this growth will not provide sufficient employment.
Morocco seeks to foster the entrepreneurial spirit of young Moroccans in order to encourage the creation, development of enterprises and the remuneration of investment in the service of employment through various policies that promote the " innovation.
Students and university graduates (including students from Sidi Mohamed Ben Abdellah University in Fez) ar
The main objective of this research is to identify the role of job satisfaction in influencing strategic agility through knowledge sharing. The researcher used the descriptive as well as the analytical approach in the completion of this research by collecting data by means of the questionnaire as the main tool on a sample of the General Company for Food Industries' employees, whose number reached (76) individuals. Moreover, some statistical methods were employed to process the data; including the arithmetic mean, Standard deviation, simple linear correlation coefficient (Pearson), simple linear regression, and the median variable test. It was represented that there is a significant and essential impact of job satisfaction in influen
... Show MoreCompelling evidence proved that coronavirus disease (COVID-19) disproportionately affects minorities. The goal of the present study was to explore the effects of intersected discrimination and discrimination types on COVID-19, mental health, and cognition. A sample of 542 Iraqis, 55.7% females, age ranged from 18 to 73, with (M = 31.16, SD = 9.77). 48.7% were Muslims, and 51.3% were Christians (N = 278). We used measures for COVID-19 stressors, executive functions, intersected discrimination (gender discrimination, social groups-based discrimination, sexual orientation discrimination, and genocidal discrimination), posttraumatic stress disorder (PTSD), depression, anxiety, status and death, existential anxieties, and health. We conducted in
... Show Morewater quality assessment is still being done at specific locations of major concern. The use of Geographical Information System (GIS) based water quality information system and spatial analysis with Inverse Distance Weighted interpolation enabled the mapping of water quality indicators along Tigris river in Salah Al-Din government, Iraq. Water quality indicators were monitored by taking 13 river samples from different locations along the river during Winter season year 2020. Maps of 10 water quality indicators. This meant that the specific water quality indicator and diffuse pollution characteristics in the basin were better illustrated with the variations displayed along the course of the river than conventional line graphs. Creation of
... Show MoreThis assay rapidly detects chlorpromazine hydrochloride using its ability to reduce gold ions to form nanoparticles. Its low cost, resilience to interferences and short analysis time could facilitate environmental monitoring and biomedical analysis.
Magnetohydrodynamic (MHD) effects of unsteady blood flow on Casson fluid through an artery with overlapping stenosis were investigated. The nonlinear governing equations accompanied by the appropriate boundary conditions were discretized and solved based on a finite difference technique, using the pressure correction method with MAC algorithm. Moreover, blood flow characteristics, such as the velocity profile, pressure drop, wall shear stress, and patterns of streamlines, are presented graphically and inspected thoroughly for understanding the blood flow phenomena in the stenosed artery.
In this study, we present different methods of estimating fuzzy reliability of a two-parameter Rayleigh distribution via the maximum likelihood estimator, median first-order statistics estimator, quartile estimator, L-moment estimator, and mixed Thompson-type estimator. The mean-square error MSE as a measurement for comparing the considered methods using simulation through different values for the parameters and unalike sample sizes is used. The results of simulation show that the fuzziness values are better than the real values for all sample sizes, as well as the fuzzy reliability at the estimation of the Maximum likelihood Method, and Mixed Thompson Method perform better than the other methods in the sense of MSE, so that
... Show More