Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
The effect of surlactin produced by Lactobacillus acidophilus on eye infectious bacteria in rabbits
...Show More Authors

Twenty five vaginal swabs from outpatients' healthy women were collected from Kamal Al-Samarai Hospital, Baghdad, to isolate and identify of Lactobacillus acidophilus. Three isolates were diagnosed as L. acidophilus which represents 15% of the total number of lactic acid bacterial (LAB) isolates; other LAB types represent 65% (20 isolates).The ability of L. acidophilus to produce surlactin was detected after measuring its biological activity to inhibit the adhesion of biofilm formed by Pseudomonas aeruginosa to surfaces using test tube method. It was found that all isolates were able to produce surlactin but the activity of surlactin was varying in each isolate. Surlactin produced by isolates 1 and 13 was the most effective. Biological appl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Study the Inhibition Effect of Amoxicillin Drug for Corrosion of Carbon Steel in Saline Media
...Show More Authors

          Potentiostatic polarization and weight loss methods have been used to investigate the corrosion behavior of carbon steel in sodium chloride solution at different concentrations (0.1, 0.4 and 0.6) M under the influence of temperatures ( 293, 298, 303, 308 and 313) K. The inhibition efficiency of the amoxicillin drug on carbon steel in 0.6 M NaCl has also been studied based on concentration and temperature. The corrosion rate showed that all salt concentrations ( NaCl solution) resulted in corrosion of carbon steel in varying ratio and 0.6 M of salt solution  was the highest rate (50.46 g/m².d). The results also indicate that the rate of corrosion increases at a temperature of 313 K.. Potentiodynamic polarization studi

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Theoretical asp ects of trans lation of a lite rary text in the fram ework of lingu istic and cult ural analysis: Теоретические асп екты перевода художес твенного текста в рам ках лингвокультурологического ана лиза
...Show More Authors

          The present art icle discusses the prob lems of understanding and translating the lingu istic and cult ural aspect of a foreign lite rary text. The article considers the trans lation process through the pr ism of cult ural orientation. In the process of transl ation, the nati onal cultural iden tity should be expressed to the max imum extent, through all me ans of expre ssion that include imagery and inton ation. In addi tion to the author's sty le, special atte ntion should al so be pa id to tro pes, phraseological uni ts, colloquial wo rds and dial&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
The neology in the Iraqi dialect after the invasion of 2003 and the level of imaginative comprehension: La neología en el dialecto Iraqui tras la invasión de 2003 y el nivel de la comprensión imaginativa
...Show More Authors

       The article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of educational design design according to the theory of Ozbal in the acquisition of geographical concepts among the pupils of the fourth primary in the geography and development of their habits of mind
...Show More Authors

Summary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of Cost awareness of activation of strategic cost management techniques of industrial units: A prospective study at the General Company for the manufacture of medicines and medical supplies in the province of Mosul
...Show More Authors

The last ten years observed a shift enormous scientific in the method and way that it deals professional with the cost accounting and reflected the result those shift enormous scientific of increase the competitive environmental that accompanied the emergence of a modern manufacturing environmental on surface the long roductive life and emergence advanced information technology that give a central focus of his important on client with growing global markets growth on a large scale.

        The research aim to define the concept of cost awareness, the concept and methods of  strategic cost management and the role of cost awareness for managers of industrial units in strategic of cost managem

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Palestine Journal Of Mathematics
STATISTICAL PROPERTIES OF GENERALIZED EXPONENTIAL RAYLEIGH DISTRIBUTION
...Show More Authors

This paper demonstrates the construction of a modern generalized Exponential Rayleigh distribution by merging two distributions with a single parameter. The "New generalized Exponential-Rayleigh distribution" specifies joining the Reliability function of exponential pdf with the Reliability function of Rayleigh pdf, and then adding a shape parameter for this distribution. Finally, the mathematical and statistical characteristics of such a distribution are accomplished

View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Fri Aug 07 2020
Journal Name
Key Engineering Materials
The Effect of Particle Size Distribution on some Properties of Gypsum
...Show More Authors

Gypsum is one of the important construction materials in Iraq in plastering surfaces and gypsum board , the ability of gypsum to give a comfortable an aesthetic ambiance as a construction material increase the need of gypsum , The particle size , total surface area and particle size distribution were factors affecting plaster properties used for construction properties . In this study gypsum paste was used with different mixing ratios of particle size and studied the physical properties of these types of pastes named (standard consistency ,setting time ,density) and compressive strength . The results showed that the water to gypsum ratio increased with increasing the fineness of the gypsum to (0.75%) and the setting time to the maxi

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Studying the genotype of Aryl Hydrocarbon Receptor-Interacting Protein (AIP) Gene (rs641081C>A) in ‎Iraqi Samples with Acromegaly Pituitary Adenoma
...Show More Authors

Pituitary adenomas are the anterior pituitary tumors. Patients with an Aryl Hydrocarbon Receptor-Interacting Protein (AIP) mutation (AIP- mut) tend to have more aggressive tumors occurring at a younger age. Single nucleotide polymorphisms (SNPs) in many studies have been related to metabolic comorbidities in the general population. Study aims investigated the role of AIP gene SNPs with susceptibility to acromegaly pituitary- adenoma, with levels of LH, FSH, TSH, Testosterone, IGF1,GH, FT4 , Prolactin hormones and blood sugar levels.  The study ‎was conducted on a group of acromegaly patients, including 50 patients) both Genders( with ‎hyperplasia of the ends, and apparently healthy control group. Genotyping of

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref