In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Abstract
Background: Eventration of diaphragm is an abnormal elevation of the diaphragm. Publishing on eventration of diaphragm in Iraq is scarce.
Objective: This study was carried out to report on the Iraqi experience on eventration of diaphragm.
Methods: A total of 18 patients with eventration diaphragm were included in this study. A review of case records of patients with eventration diaphragm treated in Ibn Al-Nafees Teaching Hospital was done. Review of records took place for the period of March 2012 to Dec. 2017.
Results: The age of patients was ranged 5 months to 70 years, giving male to f
... Show MoreSteganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
The study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5
... Show Moresix specimens of the Hg0.5Pb0.5Ba2Ca2Cu3-y
Superconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th
Abstract
The study deal with two main variables:- the dimensions of distribution, and the customer loyalty . the researcher has chosen samples of Iraqi newspapers like (AL Sabah, AL Mada, AL Bayna aljdeida newspaper), because this product depends greatly on the consumption of customers so as to achieve the success. After studying the dimensions of these variables ( cost, flixibilty & deliver time ) which concerns the distribution, and for these dimensions ( marketing relationship, customer perception, customer experience, brand, & product quality) which relate to the customer loyalty . the problem has been identified in a number of remarks concerning the extent of awareness that the administration
... Show MoreAdvancements in horizontal drilling technologies are utilized to develop unconventional resources, where reservoir temperatures and pressures are very high. However, the flocculation of bentonite in traditional fluids at high temperature and high pressure (HTHP) environments can lower cuttings transportation efficiency and even result in problems such as stuck pipe, decreased rate of penetration (ROP), accelerated bit wear, high torque, and drag on the drill string, and formation damage. The major purpose of the present research is to investigate the performance of low bentonite content water-based fluids for the hole cleaning operation in horizontal drilling processes. Low bentonite content water-based drilling fluids were formulated by re
... Show MoreEach school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
The thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and
... Show MoreThe launch of the EU’s Eastern Partnership in 2009 intended to signal a new, elevated level of EU engagement with its Eastern neighborhood. Yet there remain several long-simmering and potentially destabilizing conflicts in the region, with which EU engagement thus far has been sporadic at best. The Union’s use of its Common Security and Defense Policy (CSDP) in the region and to help solve these disputes has been particularly ad hoc and inconsistent, wracked by inter-institutional incoherence and undermined by Member States’ inability to agree on a broad strategic vision for engagement with the area.
The three CSDP missions deployed to the region thus far have all suffered from this incoherence to various extents. In particu
... Show More