In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Abstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show MoreIn this study, a review of variety of processes that are used in the treatment produced water prior to reuse or to responsible disposal are presented with their environmental issues and economical benefits. Samples of produced water from five locations in Rumaila oilfield/in south of Iraq were taken and analyzed for their contents of brine, some heavy metals, total suspended solids and oil and grease. Moreover, two samples of water were treated using reverse osmosis technique which showed its ability to treat such contaminated water. The results showed that the environmental impact of produced water arises from its chemical composition; i.e., its salt content, its heavy metals, and hydrocarbon contents.
The present research focuses on the study of the effect of mass transfer resistance on the rate of heat transfer in pool boiling. The nucleate pool boiling heat transfer coefficients for binary mixtures (ethanol-n-butanol, acetone-n-butanol, acetone-ethanol, hexane-benzene, hexane-heptane, and methanol-water) were measured at different concentrations of the more volatile components. The systems chosen covered a wide range of mixture behaviors.
The experimental set up for the present investigation includes electric heating element submerged in the test liquid mounted vertically. Thermocouple and a digital indictor measured the temperature of the heater surface. The actual heat transfer rate being obtained by multiplying the voltme
... Show MoreThis paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreIn this research, the performance of a two kind of membrane was examined to recovering the nutrients (protein and lactose) from the whey produced by the soft cheese industry in the General Company for Food Products inAbo-ghraab.Wheyare treated in two stages, the first including press whey into micron filter made of poly vinylidene difluoride (PVDF) standard plate type 800 kilo dalton, The membrane separates the whey to permeate which represent is the main nutrients and to remove the fat and microorganisms.The second stage is to isolate the protein by using ultra filter made of polyethylsulphone(PES)type plate with a measurement of 10,60 kilo dalton and the recovery of lactose in the form of permeate.
The results showed that the percen
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show Moreحظيت عدد من الشخصيات التاريخية ممن كان لها أثر واضح المعالم في تطور النظام الإداري والسياسي للإمبراطورية المغولية، بأهتمام عدد لا بأس به من الباحثين.
the civil relation between Iraqis and Egyptian was close , it is clear that is the opening relation between two countries esoecally in trade and demand education , but after mongle occupation , For the capital of the Abbasid Caliphate, the situation in Baghdad, had changed in 656 AH/1258 AD, the Iraqi migration started security and safety, including scholars and writers, in addition to the presence of entire Iraqi families who immigrated to Egypt and resided there, including the family of Al-Hafiz Al-Iraqi The Ibn al-Kwaik family, the subject of the study, had an important impact on the scientific movement in Egypt.
the civil relation between Iraqis and Egyptian was close , it is clear that is the opening relation between two countries esoecally in trade and demand education , but after mongle occupation , For the capital of the Abbasid Caliphate, the situation in Baghdad, had changed in 656 AH/1258 AD, the Iraqi migration started security and safety,
The title compound was synthesized by 2:1 condensation between adamantan-1-ylamine and benzene-1,4- dicarbaldehyde in n-BuOH and produced a good yield 87% of new bis Schiff base. The compound skeleton was affirmed by FTIR, 1H NMR, LC-MS, and X-ray powder diffraction. The structure was solved by a parallel tempering process and refined by using Rietveld refinement. Two adamantan-1-ylimino groups are connected in the anti-positions to the planar central 1,4-dimethylbenzene group. All rings of the adamantyl group possess normal chair conformation.