Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison some of methods wavelet estimation for non parametric regression function with missing response variable at random
...Show More Authors

Abstract

 The problem of missing data represents a major obstacle before researchers in the process of data analysis in different fields since , this problem is a recurrent one in all fields of study including social , medical , astronomical and clinical experiments .

The presence of such a problem within the data to be studied may influence negatively on the analysis and it may lead to misleading conclusions , together with the fact that these conclusions that result from a great bias caused by that problem in spite of the efficiency of wavelet methods but they are also affected by the missing of data , in addition to the impact of the problem of miss of accuracy estimation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
American strategic performance towards Middle East in the era of president Trump - A future study
...Show More Authors

Abstract The strategic performance of the United States depends on dealing with the Middle East countries and its variants on several bases and motives that enabled them to achieve American hegemony and invest its interests at the expense of the region countries. Within this performance, the administration of the United State President Donald Trump presented the Strategic Document on December 18, 2017, which focused on the principle of "America First", to determine the direction of future US strategic performance in the formulation of means of cooperation and intersections or hostility in addition to interests and threats.The future vision of the Arab region and the Middle East as a whole, this strategy is based on the fact that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
ORGANIZATION OF MEMORY CHIPS IN MEMORY SYSTEMS THAT HAVE WORD SIZE WIDER THAN 8-BIT
...Show More Authors

This paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Engineering Science And Technology (jestec)
Analysis Of Sedimentation In Trunk Sewer With Laboratory Investigation Of Sewage Sediment Characteristics In Baghdad City
...Show More Authors

Sediment accumulated in sewers is a major concern source as it induces numerous operational and environmental problems. For instance, during wet weather flow, the re-suspension of this sediment accompanied by the combined sewer overflow may cause huge pollutant load to the receiving water body. The characteristics of the sewer sediment are important as it shapes its behaviour and determines the extent of the pollution load. In this paper, an investigation of sewer sediment and its characterization is done for a case study in Baghdad city. Sediment depth covers more than 50% of the sewer cross-sectional area; several operational causes are comprised to cause this huge depths of sediment depositions. The testing and analysis of the s

... Show More
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Phenol from Aqueous Solutions Using Bulk ionic Liquid Membranes
...Show More Authors

Room temperature ionic liquids show potential as an alternative to conventional organic membrane solvents mainly due to their properties of low vapour pressure, low volatility and they are often stable. In the present work, the technical feasibilities of room temperature ionic liquids as bulk liquid membranes for phenol removal were investigated experimentally. In this research several hydrophobic ionic liquids were synthesized at laboratory. These ionic liquids include (1-butyl-3-methylimidazolium bis (trifluoromethylsulfonyl) imide[Bmim][NTf2], 1-Hexyl-3-methylimidazolium bis (trifluoromethylsulfonyl) imide[Hmim][NTf2], 1-octyl-3-methylimidazolium bis (trifluoromethylsulfonyl)imide[Omim][NTf2],1‐butyl

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 02 2012
Journal Name
Education College Journal/al-mustansiriyah University
On Significance Testimator in Pareto Distribution Via Shrinkage Technique
...Show More Authors

In this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.

Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bayesian Approach for estimating the unknown Scale parameter of Erlang Distribution Based on General Entropy Loss Function
...Show More Authors

We are used Bayes estimators for unknown scale parameter  when shape Parameter  is known of Erlang distribution. Assuming different informative priors for unknown scale  parameter. We derived The posterior density with posterior mean and posterior variance using different informative priors for unknown scale parameter  which are the inverse exponential distribution, the inverse chi-square distribution, the inverse Gamma distribution, and the standard Levy distribution as prior. And we derived Bayes estimators based on the general entropy loss function (GELF) is used the Simulation method to obtain the results. we generated different cases for the parameters of the Erlang model, for different sample sizes. The estimates have been comp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bayesian Estimation for Two Parameters of Gamma Distribution Under Precautionary Loss Function
...Show More Authors

In the current study, the researchers have been obtained Bayes estimators for the shape and scale parameters of Gamma distribution under the precautionary loss function, assuming the priors, represented by Gamma and Exponential priors for the shape and scale parameters respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation.

Based on Monte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s). The results show that, the performance of Bayes estimator under precautionary loss function with Gamma and Exponential priors is better than other estimates in all cases.

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Evaluation of Baghdad water quality using Fuzzy logic
...Show More Authors

Fuzzy measures are considered important tools to solve many environmental problems. Water pollution is one of the environmental problems, which has negatively effect on the health of consumers. In this paper, a mathematical model is proposed to evaluate water quality in the distribution networks of Baghdad city. Fuzzy logic and fuzzy measures have been applied to evaluate water quality with respect to chemical and microbiological contaminants. Our results are evaluate water pollution of some chemical and microbiological contaminants, which are difficult to evaluation through traditional methods.

View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
On Estimating Reliability of a Stress – Strength Model in Case of Rayleigh Pareto Distribution
...Show More Authors

The stress – strength model is one of the models that are used to compute reliability. In this paper, we derived mathematical formulas for the reliability of the stress – strength model that follows Rayleigh Pareto (Rayl. – Par) distribution. Here, the model has a single component, where strength Y is subjected to a stress X, represented by moment, reliability function, restricted behavior, and ordering statistics. Some estimation methods were used, which are the maximum likelihood, ordinary least squares, and two shrinkage methods, in addition to a newly suggested method for weighting the contraction. The performance of these estimates was studied empirically by using simulation experimentation that could give more varieties for d

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref