In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The research aims to show the effect of some short-term debt instruments (central treasury transfers, cash credit granted to the government by commercial banks) on the production of the wheat crop in Iraq, through its effect on money supply during the period (1990-2018), As the study includes two models according to the statistical program (Eviews9), the first model included measuring the effect of short-term debt instruments on money supply, and the second measuring the extent of the money supply's impact on Wheat crop production, as the results of the standard analysis showed that the short-term debt instruments used in the model were Significant effect on wheat crop production indirectly through its effect on money supply, As
... Show MoreThe compound 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD), an environmental contaminant, is a potent ligand for aryl hydrocarbon receptor (AhR). In the current study, we made an exciting observation that naive C57BL/6 mice that were exposed i.p. to TCDD showed massive mobilization of myeloid-derived suppressor cells (MDSCs) in the peritoneal cavity. These MDSCs were highly immunosuppressive and attenuated Con A–induced hepatitis upon adoptive transfer. TCDD administration in naive mice also led to induction of several chemokines and cytokines in the peritoneal cavity and serum (CCL2, CCL3, CCL4, CCL11, CXCL1, CXCL2, CXCL5, CXCL9, G-CSF, GM-CSF, VEGF, and M-CSF) and chemokine receptors
سنقوم في هذا البحث باشتقاق توزيع الطلب خلال فترة الانتظار لنظام سيطرة على الخزين يخضع فيه الطلب لتوزيع گاما فيما يخضع وقت الانتظار للتوزيع اللوغايتمي الطبيعي، كما سيتم استخراج العزوم الأساسية لهذا المتغير ، الضرورية بدورها لاستخراج بعض مؤشرات النظام المذكور.
المصطلحات المستخدمة: التكامل المحيط، المستوي المركب، تكامل هانكيل، مستوى إعادة الطلب، الوقاية.
The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreFinding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved. In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)
... Show MoreResearch includes evaluation of projects implemented and which entered into trial operation period in accordance with the evaluation criteria and of (cost, quality and time) to determine the size deviations gap for the sample of projects during the years of assessment (2011-2012-2013-2014) of each of the three evaluation criteria, and then followed by a calculation the size of the overall gap to the problem based on the research problem to determine deviations from the specific implementation of each project by answering several questions to answer turns out the reasons for these deviations occur.
The importance of research Focus on the evaluation of received projects from contractors executing the projec
... Show MoreThe research aims to a statement of specificity of the Controller of (academic achievement, specialty, job title, length of service, Gender) and its impact on performance, Through a proposed appraisal form includes three main axes and each axis including several specialized elements in the supervisory work in form (check list). as is the importance of research to enable officials of oversight bodies financial identify and diagnose performance Controller through what has this observer of the process of scientific properties when performing supervisory work. Be summarized problem of the research that the lack of regulatory institution with the Controller interesting in terms of the necessary characteristics and requirements and inv
... Show More