Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Elastic Electron Scattering From Unstable Neutron-Rich P19PC Exotic Nucleus
...Show More Authors

The ground state proton, neutron, and matter density distributions and corresponding root-mean-square (rms) of P19PC exotic nucleus are studied in terms of two-frequency shell model (TFSM) approach. The single-particle wave functions of harmonic-oscillator (HO) potential are used with two different oscillator parameters bRcoreR and bRhaloR. According to this model, the core nucleons of P18PC nucleus are assumed to move in the model space of spsdpf. The shell model calculations are carried out for core nucleons with w)20(+ truncations using the realistic WBP
interaction. The outer (halo) neutron in P
19
PC is assumed to move in the pure 2sR1/2R-
orbit. The halo structure in P
19
PC is confirmed with 2sR1/2R-dominant c

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Estimate the Two Parameters of Gamma Distribution Under Entropy Loss Function
...Show More Authors

In this paper, Bayes estimators for the shape and scale parameters of Gamma distribution under the Entropy loss function have been obtained, assuming Gamma and Exponential priors for the shape and scale parameters respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation. Based on Monte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s). The results show that, the performance of the Bayes estimator under Entropy loss function is better than other estimates in all cases.   

View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
International Journal Of Physics And Research (ijpr)
GAMMA RAY PROPERTIES FROM70As NUCLEUS
...Show More Authors

Multipole mixing ratios for gamma transition populated in from reaction have been studied by least square fitting method also transition strength ] for pure gamma transitions have been calculated taking into account the mean life time for these levels .

Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Estimation of Time of Survival Rate by Using Clayton Function for the Exponential Distribution with Practical Application
...Show More Authors

Each phenomenon contains several variables. Studying these variables, we find mathematical formula to get the joint distribution and the copula that are a useful and good tool to find the amount of correlation, where the survival function was used to measure the relationship of age with the level of cretonne in the remaining blood of the person. The Spss program was also used to extract the influencing variables from a group of variables using factor analysis and then using the Clayton copula function that is used to find the shared binary distributions using multivariate distributions, where the bivariate distribution was calculated, and then the survival function value was calculated for a sample size (50) drawn from Yarmouk Ho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Height-to-Length Ratio Effect on the Response of Unreinforced Masonry Wall Subjected to Vertical Load Using Detailed-Micro Modeling Approach
...Show More Authors

This paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained fro

... Show More
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
A Realistic Aggregate Load Representation for A Distribution Substation in Baghdad Network
...Show More Authors

Electrical distribution system loads are permanently not fixed and alter in value and nature with time. Therefore, accurate consumer load data and models are required for performing system planning, system operation, and analysis studies. Moreover, realistic consumer load data are vital for load management, services, and billing purposes. In this work, a realistic aggregate electric load model is developed and proposed for a sample operative substation in Baghdad distribution network. The model involves aggregation of hundreds of thousands of individual components devices such as motors, appliances, and lighting fixtures. Sana’a substation in Al-kadhimiya area supplies mainly residential grade loads. Measurement-based

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
On Estimation of P(Y_1<X<Y_2 ) in Cased Inverse Kumaraswamy Distribution
...Show More Authors

This paper deals with the estimation of the stress strength reliability for a component which has a strength that is independent on opposite lower and upper bound stresses, when the stresses and strength follow Inverse Kumaraswamy Distribution. D estimation approaches were applied, namely the maximum likelihood, moment, and shrinkage methods. Monte Carlo simulation experiments were performed to compare the estimation methods based on the mean squared error criteria.

View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
A field study of the problems of queues at some checkpoints in the city of Baghdad
...Show More Authors

 

Abstract

Due to the momentum of winning in the streets of the city of Baghdad as a result of the large number of checkpoints so felt researcher to conduct a field visit to find out the main reasons that led to this congestion and to find practical solutions to mitigate wastage winning the arrival time citizen to where you want the least possible time.

This research aims to overcome the difficulties experienced by citizens to reach their places of work and reduce waste at the time of service and waiting time as well as reduce the cost of waiting.

Has emerged study a set of conclusions, including the use of model queue (G / G / C) and the mome

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
...Show More Authors

The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref