Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Machine Learning Techniques for Analyzing Survival Data of Breast Cancer Patients in Baghdad
...Show More Authors

The Machine learning methods, which are one of the most important branches of promising artificial intelligence, have great importance in all sciences such as engineering, medical, and also recently involved widely in statistical sciences and its various branches, including analysis of survival, as it can be considered a new branch used to estimate the survival and was parallel with parametric, nonparametric and semi-parametric methods that are widely used to estimate survival in statistical research. In this paper, the estimate of survival based on medical images of patients with breast cancer who receive their treatment in Iraqi hospitals was discussed. Three algorithms for feature extraction were explained: The first principal compone

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables
...Show More Authors

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Determinations of The Depths to Magnetic Sources Over Al-Ma′Aniyah Depression Area-Southwest Iraq Using The Aeromagnetic Data and Their Tectonic Implication
...Show More Authors

     Tectonically, the location of the Al-Ma'aniyah depression area is far from active boundary zones, their tectonic features have to reflect the original depositional environments with some horizontal movement due to rearrangement of the basement blocks during different actives orogenic movements. So, the analysis of aeromagnetic data were considered to estimate the thickness and structural pattern of the sedimentary cover sequences for this area. The aeromagnetic data, which are derived from Iraqi GEOSURV to Al-Ma′aniyah region is analyzed and processed for qualitative and quantitative interpretations. The process includes reducing the aeromagnetic data to pole RTP, separation the aeromagnetic data to regional an

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2024
Journal Name
Advances In The Theory Of Nonlinear Analysis And Its Application
Properties of Capturing of Peristaltic Flow to A Chemically Reacting Couple Stress Fluid Through an Inclined Asymmetric Channel with Variable Viscosity and Various Boundaries
...Show More Authors

The properties of capturing of peristaltic flow to a chemically reacting couple stress fluid through an inclined asymmetric channel with variable viscosity and various boundaries are investigated. we have addressed the impacts of variable viscosity, different wave forms, porous medium, heat and mass transfer for peristaltic transport of hydro magnetic couple stress liquid in inclined asymmetric channel with different boundaries. Moreover, The Fluid viscosity assumed to vary as an exponential function of temperature. Effects of almost flow parameters are studied analytically and computed. An rising in the temperature and concentration profiles return to heat and mass transfer Biot numbers. Noteworthy, the Soret and Dufour number effect resul

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Vostok. Afro-aziatskie Obshchestva: Istoriia I Sovremennost
The carrier of word-formation meaning in russian and arabic gramatic traditions: the word model in the russian-arabic translation algorithm
...Show More Authors

The article is devoted to the Russian-Arabic translation, a particular theory of which has not been developed in domestic translation studies to the extent that the mechanisms of translation from and into European languages are described. In this regard, as well as with the growing volumes of Russian-Arabic translation, the issues of this private theory of translation require significant additions and new approaches. The authors set the task of determining the means of translation (cognitive and mental operations and language transformations) that contribute to the achievement of the most equivalent correspondences of such typologically different languages as Russian and Arabic. The work summarizes and analyzes the accumulated exper

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
وقائع مؤتمر
نشاطات الملكة أبي-سمتي خلال حكم الملكين أمار-سين وشو-سين
...Show More Authors

تعد أبي- سمتي واحدة من أهم النساء التي لعبت دوراً هاماً في الحياة الاقتصادية في عصر أور الثالثة (2112-2004 ق.م)، فقد برزت خلال حكم زوجها الملك أمار-سين (2046-2038 ق.م) وحكم الملك شو-سين (2037-2029 ق.م) وكان لها دور أداري هام في النصوص الاقتصادية فقد ظهرت في عمليات الأستلام وتسليم الماشية والنفقات والمدخولات، فهي على مايبدو كانت مسؤولة عن حظيرة أو مؤسسة ما خلال حكم زوجها وأخيه ومن أشهر تلك الحظائر كانت (حظيرة دريهم) التي كانت تحت

... Show More
Publication Date
Tue May 30 2023
Journal Name
مجلة اقتصاديات الاعمال للبحوث التطبيقية
(2002-2021) تقدير وتحليل دالة التكاليف لشركة ديالى العامة خلال المدة
...Show More Authors

The study aims to diagnose the levels of total costs borne by the Diyala State Company, then estimate and analyze the quantitative relationship between the different items of these costs, in addition to the impact of the productive activity on them. This was done by choosing the different variables affecting the costs and their different items for the company under study, and relying on the data issued by the company during the period (2002-2021), based on a methodology that combines the descriptive and econometric methods in order to estimate and analyze the cost function in the concerned company. According to the estimated function of the costs of the company under study, the study concluded that the value of production affects the total

... Show More
Preview PDF
Publication Date
Tue Oct 06 2020
Journal Name
College Of Islamic Sciences
الصناعة وأثرها في بلاد المشرق الإسلامي خلال العصر العباسي 132- 656هـ
...Show More Authors

The process of doing many kinds of industries , crafts , professions around Islamic Arabian State , they enable us to say that Arab Muslims over their homelands had been occupied various types of crafts and manufacturing before emergence Islam . Moreover Islam encouraged to work within manufacture field . And These matters were clarified through verses of the Holy Qur’an and honored prophetic guidance ( Sunna  )  . Whereas Arab Muslims applied principle “ Free of Business “  . They admitted to different social groups such as pact – fellows people  to profession or craft which they desire to work . We have to not forget that Arab Muslims had broken all restraints and shackles which had restricted the worker bef

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Trends of Fiscal Policy in bearing the financial burden of the government and the Extent Leadership in Iraq during the period 2004- 2014
...Show More Authors

Abstract

There has been a heated controversy over the role the financial policy plays and how sufficient   it   is   in affording   the   financial   burden. This   burden   is   known as the operational   current expenses   which   the   governments   of   various countries mainly afford,   despite the   discrepancy   in   the   government’s   economic   policy.   After   the deterioration and deficit in the state budget in all countries nowadays, it was necessary to find an appropri

... Show More
View Publication Preview PDF
Crossref