In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the exp
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreAbstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w
This experiment was conducted to study the effect of injecting hatching eggs into a flock of broiler aged mothers with different concentrations of the alcoholic extract of Moringa oleifera powder on productive performance of broilers during the period of rearing of 35 days. The study included two experiments for a period at 2/10/2021 to 28/11/2021, where eggs were injected into the Mustafa Poultry Hatchery/ Wasit Governorate- Aziziyah District. A 400 hatching eggs of 308 Ross mothers of modern broilers used at age of 48 week, eggs of average weight 66 ± 1 g/egg were collected in same day then stored for two days. A quarter of treatments were randomly distributed with 100 eggs for each treatment.
... Show MoreThe study of history has begun to become increasingly important for those interested in the field of education in general, and physical education and sports sciences in particular. It is a recent study of the past and relying on it. Therefore, studying the history of sports for people with disabilities and their development is of great importance, as it is one of the means to measure the extent of development of societies and their culture in this field. Weightlifting is a sport for people with motor disabilities, and the way to play is for the contestant to lie on the bench (ping bar) and most often the legs are tied to the bench to ensure that the hip and legs do not contribute to the lifting process with the arms, when the player grabs t
... Show MoreThis study seeks to identify the role that the leadership trend plays in the management of health institutions in Iraq and its impact on improving the quality of the health service provided by analyzing some opinions of affiliates working in the Iraqi health sector where a survey list was used as a main tool for collecting primary data, as it was subjected to this analysis ( 60) of the medical staff, of whom (40) are doctors and (20) are affiliated with the rank of assistant physician, and (60) members of the administrative cadre have undergone their various job ranks and administrative specializations (department manager, auditor, observer, accountant, statistician, secretary). Reliance on statistical software (spss) in data ana
... Show MoreGiven the importance that the Iraqi banking system in general and Islamic banks in particular, there must be effective supervisory oversight of these banks, as supervisory oversight has an essential and effective role in the development and evaluation of the performance of banks, through the application of legal controls and rules. Banking aimed at making sure that its financial centers are safe, protecting depositors' funds, and achieving both monetary and economic stability. This research studied and evaluates the mechanisms and tools used by the Central Bank of Iraq in the supervision and supervision of these banks. Therefore, the research aimed to measure the type and direction of the relationship between the requirements of supervis
... Show Moreמטרת המחקר הזה היא לבדוק את שלושה סיפורים קצרים מהקובץ הראשון של אהרון אפלפלד , שנחשב ההצהרה הרשמית על היותו סופר השואה הראשון בישראל , המשותף לשלושת הסיפורים הוא הנימה של הגיבורים היוצאים למסע פיזי ונפשי לגלות את אשר אירע להם , מגמתו של המחקר היא לבדוק את הצורה המיוחדת שבה אפיין אפלפלד את גיבוריו שמעידים על כך , כי השואה היא החוויה המרה והקשה בקרב היהודים והשלכותיה נשארה טמונה בקרבם גם אחרי המלחמה ואחרי שנים
... Show More