Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 03 2020
Journal Name
International Journal Of Diabetes In Developing Countries
The efficacy of once-daily liraglutide as an add-on to oral antidiabetic agents on weight reduction and glycemic control in obese patients with inadequately controlled type 2 diabetes: a retrospective analysis in relation to liraglutide dose escalation within a 7-month treatment period
...Show More Authors

Background This study aimed to evaluate the efficacy of once-daily liraglutide as an add-on to oral antidiabetics (OADs) on glycemic control and body weight in obese patients with inadequately controlled type 2 diabetes (T2D). Methods A total of 27 obese T2D patients who received 7 months (0.6 mg/day for the first month, 1.2 mg/day for 3 months, and 1.8 mg/day for 3 months) of liraglutide treatment as an add-on to OADs were included. Data on body weight (kg), fasting plasma glucose (FPG, mg/dL), postprandial glucose (PPG, mg/dL), and HbA1c (%), were recorded. Results Liraglutide doses of 1.2 mg/day and 1.8 mg/day were associated with significant decreases in body weight (by 8.0% and 11.9%, respectively, p < 0.01 for each) and HbA1c (by 20.0

... Show More
Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Physics: Conference Series
Manufacturing and studying the effect of partial substitution on the properties of the compound Bi<sub>2-x</sub> Ag<sub>x</sub>Sr<sub>1.9</sub>Ba<sub>0.1</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> superconductors.
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
Solzhenitsyn's Style of Artistic Research: Опыт стиля художественного исследования А.Солженицыным
...Show More Authors

 Aleksandr Isayevich Solzhenitsyn was born in 1918 in Kislovodsk. His father was educated, and despite his peasantry origin, he got a university degree. Unfortunately, however, Solzhenitsyn could not recognize his father, for he died before his birth.

Solzhenitsyn was accused of being an opponent to the Soviet Union due to his activities of that time. He was exiled to a forced labour camp for eight years, on the surroundings of Moscow. He spent three years in Kazakhstan, and was sent to the life exile. He was set free in 1956. He worked as a teacher in in rural schools in Vladimir and then in Rezhran. 

His greatest works were in the reign of Kherchov, and in 1962 appeared his story under the title of "One day in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Econometrics of the impact of financial inclusion on banking stability in Iraq
...Show More Authors

        Financial inclusion refers to the access of financial services at low cost and high-quality from the formal financial sector to all segments of society, especially marginalized groups, and then use and benefit from them. Financial inclusion is also associated with banking stability, as well as with financial integrity and financial protection for the consumer, therefore, it achieves a number of objectives, the most important of which is to support and enhance banking stability. This is what made it attract the attention of many countries and central banks recently.

     The study aims to show the impact of financial inclusion indicators on ban

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique
...Show More Authors

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Nov 10 2023
Journal Name
2023 3rd International Scientific Conference Of Engineering Sciences (isces)
Using User Experience Metrics for Academic Management System of University of Baghdad
...Show More Authors

Interface evaluation has been the subject of extensive study and research in human-computer interaction (HCI). It is a crucial tool for promoting the idea that user engagement with computers should resemble casual conversations and interactions between individuals, according to specialists in the field. Researchers in the HCI field initially focused on making various computer interfaces more usable, thus improving the user experience. This study's objectives were to evaluate and enhance the user interface of the University of Baghdad's implementation of an online academic management system using the effectiveness, time-based efficiency, and satisfaction rates that comply with the task questionnaire process. We made a variety of interfaces f

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Spiking Neural Network in Precision Agriculture
...Show More Authors

In this paper, precision agriculture system is introduced based on Wireless Sensor Network (WSN). Soil moisture considered one of environment factors that effect on crop. The period of irrigation must be monitored. Neural network capable of learning the behavior of the agricultural soil in absence of mathematical model. This paper introduced modified type of neural network that is known as Spiking Neural Network (SNN). In this work, the precision agriculture system  is modeled, contains two SNNs which have been identified off-line based on logged data, one of these SNNs represents the monitor that located at sink where the period of irrigation is calculated and the other represents the soil. In addition, to reduce p

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2024
Journal Name
Journal Of Water And Health
Anthropocentric perspective on climate variability: the destination of antibiotics in the Tigris river is not restricted
...Show More Authors
ABSTRACT<p></p><p>This study aimed to detect antibiotics in water, particulate, plant, and sediment in the Tigris River within Baghdad City, in addition to their spatiotemporal variations, and related physicochemical parameters. Five sites were selected in the river. Three target antibiotics (tetracycline, gentamycin, and ciprofloxacin) were detected in water, particulate, plant, and sediment of the river at all selected sites. The results clearly showed that the concentrations of target antibiotics were sediment &gt; water &gt; plant &gt; particulate. Site 3 is considered as a risk site where high concentrations of all antibiotics during the wet and dry seasons wer</p> ... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Experimental Study of Interior Temperature Distribution Inside Parked Automobile Cabin
...Show More Authors

Temperature inside the vehicle cabin is very important to provide comfortable conditions to the car passengers. Temperature inside the cabin will be increased, when the car is left or parked directly under the sunlight. Experimental studies were performed in Baghdad, Iraq (33.3 oN, 44.4 oE) to investigate the effects of solar radiation on car cabin components (dashboard, steering wheel, seat, and inside air). The test vehicle was oriented to face south to ensure maximum (thermal) sun load on the front windscreen. Six different parking conditions were investigated. A suggested car cover was examined experimentally. The measurements were recorded for clear sky summer days started at 8 A.M. till 5 P.M.

... Show More
View Publication Preview PDF