In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce costs) to prove the hypothesis has sought research to achieve its goal of Alkadivh and Alkoppelan &nb
... Show MoreThe nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.
In the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re
... Show MoreTwenty five vaginal swabs from outpatients' healthy women were collected from Kamal Al-Samarai Hospital, Baghdad, to isolate and identify of Lactobacillus acidophilus. Three isolates were diagnosed as L. acidophilus which represents 15% of the total number of lactic acid bacterial (LAB) isolates; other LAB types represent 65% (20 isolates).The ability of L. acidophilus to produce surlactin was detected after measuring its biological activity to inhibit the adhesion of biofilm formed by Pseudomonas aeruginosa to surfaces using test tube method. It was found that all isolates were able to produce surlactin but the activity of surlactin was varying in each isolate. Surlactin produced by isolates 1 and 13 was the most effective. Biological appl
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
This study focuses on the relative frequency of Streptococcus pneumoniae in children with culture-proven bacterial meningitis. The epidemiology has been investigated with clinical and laboratory findings in The Central Public Health Laboratory, Iraq from April to September, 2010. From (138) samples , (55) cases (39.85 %) were diagnosed by physician as bacterial meningitis, (23) cases (16.66 %) as viral menginitis , (18) cases (13.04 %) as different medical cases (e.g febrile convulsion , meningoencephalitis , epilepsy …etc) and (42) cases (30.43 %) as unidentified medical cases. For bacterial meningitis S.pneumoniae was isolated from (10) cases (18.18 %) only. The median age for bacterial meningitis was (130.75) month and the predomina
... Show Moreresearch aims: 1- Demonstrating an aspect of the rhetorical miracle of the Qur’an represented in the accuracy of its verses and the consistency of its topics. 2- Clarifying the intent of Surat Al-Ghashiya, and clarifying the link between the topics of the surah and its purpose. 3- Studying the topics included in Surat Al-Gashiya, and highlighting their consistency among them. 4- Referring to the gifts contained in the noble verses.Research Methodology: In preparing this study, I followed the inductive-analytical approach, according to the procedures outlined in the introduction.From the search results: 1- The purpose of Surat Al-Gashiya: Reminding the Hereafter and its scenes of reward
... Show MorePotentiostatic polarization and weight loss methods have been used to investigate the corrosion behavior of carbon steel in sodium chloride solution at different concentrations (0.1, 0.4 and 0.6) M under the influence of temperatures ( 293, 298, 303, 308 and 313) K. The inhibition efficiency of the amoxicillin drug on carbon steel in 0.6 M NaCl has also been studied based on concentration and temperature. The corrosion rate showed that all salt concentrations ( NaCl solution) resulted in corrosion of carbon steel in varying ratio and 0.6 M of salt solution was the highest rate (50.46 g/m².d). The results also indicate that the rate of corrosion increases at a temperature of 313 K.. Potentiodynamic polarization studi
... Show More