In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Abstract
We produced a study in Estimation for Reliability of the Exponential distribution based on the Bayesian approach. These estimates are derived using Bayesian approaches. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .we derived bayes estimators of reliability under four types when the prior distribution for the scale parameter of the Exponential distribution is: Inverse Chi-squar
... Show MoreThis paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically
The ground state proton, neutron, and matter density distributions and corresponding root-mean-square (rms) of P19PC exotic nucleus are studied in terms of two-frequency shell model (TFSM) approach. The single-particle wave functions of harmonic-oscillator (HO) potential are used with two different oscillator parameters bRcoreR and bRhaloR. According to this model, the core nucleons of P18PC nucleus are assumed to move in the model space of spsdpf. The shell model calculations are carried out for core nucleons with w)20(+ truncations using the realistic WBPinteraction. The outer (halo) neutron in P19PC is assumed to move in the pure 2sR1/2R-orbit. The halo structure in P19PC is confirmed with 2sR1/2R-dominant configuration.Elastic electr
... Show MoreA checklist of the wild mammals of Syria including their current status and geographical distribution is provided. Data related to 110 mammalian species were collected following a comprehensive review of available literature records, grey data, and online observations combined with photographic evidence and in situ surveys carried out between 2006 and 2023. The checklist comprises seven orders, 36 families, 73 genera (subgenera), and 110 species, and includes data on 15 globally threatened species of wild mammals. Overall, we report up-to-date information on taxonomic revisions, historical and current geographical range, as well as the conservation status recently assessed by the International Union for Conservation of Nature (IUCN)
... Show MoreElectrical distribution system loads are permanently not fixed and alter in value and nature with time. Therefore, accurate consumer load data and models are required for performing system planning, system operation, and analysis studies. Moreover, realistic consumer load data are vital for load management, services, and billing purposes. In this work, a realistic aggregate electric load model is developed and proposed for a sample operative substation in Baghdad distribution network. The model involves aggregation of hundreds of thousands of individual components devices such as motors, appliances, and lighting fixtures. Sana’a substation in Al-kadhimiya area supplies mainly residential grade loads. Measurement-based
... Show MoreThe Dagum Regression Model, introduced to address limitations in traditional econometric models, provides enhanced flexibility for analyzing data characterized by heavy tails and asymmetry, which is common in income and wealth distributions. This paper develops and applies the Dagum model, demonstrating its advantages over other distributions such as the Log-Normal and Gamma distributions. The model's parameters are estimated using Maximum Likelihood Estimation (MLE) and the Method of Moments (MoM). A simulation study evaluates both methods' performance across various sample sizes, showing that MoM tends to offer more robust and precise estimates, particularly in small samples. These findings provide valuable insights into the ana
... Show MoreMultipole mixing ratios for gamma transition populated in from reaction have been studied by least square fitting method also transition strength ] for pure gamma transitions have been calculated taking into account the mean life time for these levels .
The physical behavior for the energy distribution function (EDF) of the reactant particles depending upon the gases (fuel) temperature are completely described by a physical model covering the global formulas controlling the EDF profile. Results about the energy distribution for the reactant system indicate a standard EDF, in which it’s arrive a steady state form shape and intern lead to fix the optimum selected temperature.
This paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained fro
... Show MoreEach phenomenon contains several variables. Studying these variables, we find mathematical formula to get the joint distribution and the copula that are a useful and good tool to find the amount of correlation, where the survival function was used to measure the relationship of age with the level of cretonne in the remaining blood of the person. The Spss program was also used to extract the influencing variables from a group of variables using factor analysis and then using the Clayton copula function that is used to find the shared binary distributions using multivariate distributions, where the bivariate distribution was calculated, and then the survival function value was calculated for a sample size (50) drawn from Yarmouk Ho
... Show More