Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Identifying of User Behavior from Server Log File
...Show More Authors

Due to the increased of information existing on the World Wide Web (WWW), the subject of how to extract new and useful knowledge from the log file has gained big interest among researchers in data mining and knowledge discovery topics.
Web miming, which is a subset of data mining divided into three particular ways, web content mining, web structure mining, web usage mining. This paper is interested in server log file, which is belonging to the third category (web usage mining). This file will be analyzed according to the suggested algorithm to extract the behavior of the user. Knowing the behavior is coming from knowing the complete path which is taken from the specific user.
Extracting these types of knowledge required many of KDD

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 13 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Detection of Chronic Obstructive Pulmonary Disease among Smokers Aged ≥40 years Attending Primary Health Care Centers in Baghdad-AL-Karkh and AL-Resafa: الكشف عن الالكشف عن مرض الانسداد الرئوي المزمن بين المدخنين الذين تزيد أعمارهم عن 40 عامًا يراجعون مراكز الرعاية الصحية الأولية في بغداد - الكرخ و الرصافة
...Show More Authors

Background: Chronic obstructive pulmonary disease causes permanent morbidity, premature mortality and great burden to the healthcare system. Smoking is it's most common risk factor and Spirometry is for diagnosing COPD and monitoring its progression.

Objectives: Early detection of chronic obstructive pulmonary disease in symptomatic smokers’ ≥ 40years by spirometry.

Methods: A cross sectional study on all symptomatic smokers aged ≥ 40 years attending ten PHCCs in Baghdad Alkarkh and Alrisafa. Those whose FEV1/FVC was <70% on spirometry; after giving bronchodilator, were considered COPD +ve.

Results:  Overall, airway obstruction was seen in

... Show More
View Publication
Crossref
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Effects of Water Scarcity on Rural Household Economy
...Show More Authors

This study examined the effects of water scarcity on rural household economy in El Fashir Rural Council / North Darfur State- western Sudan. Both quantitative and qualitative methods were used as to get a deeper understanding of the impact of water scarcity on the rural house economy in the study area. 174 households out of 2017 were selected from 45 villages which were distributed in eight village councils forming the study area. Statistical methods were used to manipulate the data of the study. The obtained results revealed that water scarcity negatively affected the rural household economy in the study area in many features. These include the followings: much family efforts and time were directed to fetch for water consequentl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Reliability Estimation for the Exponential-Pareto Hybrid System
...Show More Authors

     The reliability of hybrid systems is important in modern technology, specifically in engineering and industrial fields; it is an indicator of the machine's efficiency and ability to operate without interruption for an extended period of time. It also allows for the evaluation of machines and equipment for planning and future development. This study looked at reliability of hybrid (parallel series) systems with asymmetric components using exponential and Pareto distributions. Several simulation experiments were performed to estimate the reliability function of these systems using the Maximum Likelihood method  and the Standard Bayes method  with a quadratic loss (QL) function and two priors: non-informative (Jeffery) and inform

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Nov 24 2020
Journal Name
Experimental Heat Transfer
Thermal performance of a flat-plate solar collector using aqueous colloidal dispersions of multi-walled carbon nanotubes with different outside diameters
...Show More Authors

The thermal performance of a flat-plate solar collector (FPSC) using novel heat transfer fluids of aqueous colloidal dispersions of covalently functionalized multi-walled carbon nanotubes with β-Alanine (Ala-MWCNTs) has been studied. Multi-walled carbon nanotubes (MWCNTs) with outside diameters of (< 8 nm) and (20–30 nm) having specific surface areas (SSAs) of (500 m2/g) and (110 m2/g), respectively, were utilized. For each Ala-MWCNTs, waterbased nanofluids were synthesized using weight concentrations of 0.025%, 0.05%, 0.075%, and 0.1%. A MATLAB code was built and a test rig was designed and developed. Heat flux intensities of 600, 800, and 1000 W/m2; mass flow rates of 0.6, 1.0, and 1.4 kg/min; and inlet fluid temperatures of 30, 40, an

... Show More
Crossref (17)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The effectiveness of intense pulsed light (home use) device in facial hair reduction
...Show More Authors

Background: Intense pulsed light (IPL) devices produce polychromatic incoherent high-intensity pulsed light with a specified wavelength spectrum, fluence, and pulse duration through the use of flashlamps and bandpass filters. Similar to lasers, IPL devices operate on the selective photothermolysis principle, with melanin acting as the chromophore. Despite this similarity, they are constructed differently and produce different amounts of light

Aim of the study: To investigate the efficacy of IPL home-use device in hair reduction technique for women with unwanted facial hair.

Subjects and methods: The study was conducted in Baghdad on forty-five female subjects with Fitzpatri

... Show More
View Publication
Crossref