In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Existing leachate models over–or underestimates leachate generation by up to three orders of magnitude. Practical experiments show that channeled flow in waste leads to rapid discharge of large leachate volumes and heterogeneous moisture distribution. In order to more accurately predict leachate generation, leachate models must be improved. To predict moisture movement through waste, the two–domain PREFLO, are tested. Experimental waste and leachate flow values are compared with model predictions. When calibrated with experimental parameters, the PREFLO provides estimates of breakthrough time. In the short term, field capacity has to be reduced to 0.12 and effective storage and hydraulic conductivity of the waste must be increased to
... Show MoreThe platforms of social networking sites, with their distinctive communication and technological features, create a social movement that led to the establishment of a new pattern of communication in a modern context. This allows the users on the internet to carry out many social interactions based on the interests and commonalities among them. Algerian women have a share of this digital presence by representing their views and discussing their issues on several sites like Facebook, for example.
In this research, we have analyzed the pages of Algerian women on Facebook site to find out the most important issues addressed by Algerian women so that we can organize their concerns in the digital channels and discover their different orie
In this paper, we study the effects of a magnetic force on the flow of hybrid bio - nano fluid (Cu - Au. NPs) for a peristaltic channel through a porous medium in an asymmetric channel. Nanoparticles of gold and copper as well as the blood (the base fluid) is taken into account. By using the Adomian decomposition method to solve the governing equations, formulas for velocity, stream function, temperature, current density, and magnetic force have been obtained. The findings show that Gold nanoparticles have an elevation magnetic force compared with copper nanoparticles, based on fluid (blood) and hybrid nanofluid. Finally, the phenomenon of trapping is offered as an explanation for the physical behavior of many parameters. The ef
... Show MoreThis study deals with the application of surface-consistent deconvolution to the two-dimensional seismic data applied to the Block 11 area within the administrative boundaries of Najaf and Muthanna Governorates with an area of 4822 , the processed seismic data of line (7Gn 21) is 54 km long. The study was conducted within the Processing Department of the Oil Exploration Company. The gap surface- consistent deconvolution was applied using best results of the parameters applied were: The length of the operator 240, the gap operator 24, the white noise 0.01%, the seismic sections of this type showed improvement with the decay of the existing complications and thus give a good continuity of the reflectors
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreThis paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show MoreGround-based active optical sensors (GBAOS) have been successfully used in agriculture to predict crop yield potential (YP) early in the season and to improvise N rates for optimal crop yield. However, the models were found weak or inconsistent due to environmental variation especially rainfall. The objectives of the study were to evaluate if GBAOS could predict YP across multiple locations, soil types, cultivation systems, and rainfall differences. This study was carried from 2011 to 2013 on corn (Zea mays L.) in North Dakota, and in 2017 in potatoes in Maine. Six N rates were used on 50 sites in North Dakota and 12 N rates on two sites, one dryland and one irrigated, in Maine. Two active GBAOS used for this study were GreenSeeker and Holl
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More