In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Abstract
The problem of missing data represents a major obstacle before researchers in the process of data analysis in different fields since , this problem is a recurrent one in all fields of study including social , medical , astronomical and clinical experiments .
The presence of such a problem within the data to be studied may influence negatively on the analysis and it may lead to misleading conclusions , together with the fact that these conclusions that result from a great bias caused by that problem in spite of the efficiency of wavelet methods but they are also affected by the missing of data , in addition to the impact of the problem of miss of accuracy estimation
... Show MoreAbstract The strategic performance of the United States depends on dealing with the Middle East countries and its variants on several bases and motives that enabled them to achieve American hegemony and invest its interests at the expense of the region countries. Within this performance, the administration of the United State President Donald Trump presented the Strategic Document on December 18, 2017, which focused on the principle of "America First", to determine the direction of future US strategic performance in the formulation of means of cooperation and intersections or hostility in addition to interests and threats.The future vision of the Arab region and the Middle East as a whole, this strategy is based on the fact that
... Show MoreThis paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically
Sediment accumulated in sewers is a major concern source as it induces numerous operational and environmental problems. For instance, during wet weather flow, the re-suspension of this sediment accompanied by the combined sewer overflow may cause huge pollutant load to the receiving water body. The characteristics of the sewer sediment are important as it shapes its behaviour and determines the extent of the pollution load. In this paper, an investigation of sewer sediment and its characterization is done for a case study in Baghdad city. Sediment depth covers more than 50% of the sewer cross-sectional area; several operational causes are comprised to cause this huge depths of sediment depositions. The testing and analysis of the s
... Show MoreRoom temperature ionic liquids show potential as an alternative to conventional organic membrane solvents mainly due to their properties of low vapour pressure, low volatility and they are often stable. In the present work, the technical feasibilities of room temperature ionic liquids as bulk liquid membranes for phenol removal were investigated experimentally. In this research several hydrophobic ionic liquids were synthesized at laboratory. These ionic liquids include (1-butyl-3-methylimidazolium bis (trifluoromethylsulfonyl) imide[Bmim][NTf2], 1-Hexyl-3-methylimidazolium bis (trifluoromethylsulfonyl) imide[Hmim][NTf2], 1-octyl-3-methylimidazolium bis (trifluoromethylsulfonyl)imide[Omim][NTf2],1‐butyl
... Show MoreIn this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.
We are used Bayes estimators for unknown scale parameter when shape Parameter is known of Erlang distribution. Assuming different informative priors for unknown scale parameter. We derived The posterior density with posterior mean and posterior variance using different informative priors for unknown scale parameter which are the inverse exponential distribution, the inverse chi-square distribution, the inverse Gamma distribution, and the standard Levy distribution as prior. And we derived Bayes estimators based on the general entropy loss function (GELF) is used the Simulation method to obtain the results. we generated different cases for the parameters of the Erlang model, for different sample sizes. The estimates have been comp
... Show MoreIn the current study, the researchers have been obtained Bayes estimators for the shape and scale parameters of Gamma distribution under the precautionary loss function, assuming the priors, represented by Gamma and Exponential priors for the shape and scale parameters respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation.
Based on Monte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s). The results show that, the performance of Bayes estimator under precautionary loss function with Gamma and Exponential priors is better than other estimates in all cases.
Fuzzy measures are considered important tools to solve many environmental problems. Water pollution is one of the environmental problems, which has negatively effect on the health of consumers. In this paper, a mathematical model is proposed to evaluate water quality in the distribution networks of Baghdad city. Fuzzy logic and fuzzy measures have been applied to evaluate water quality with respect to chemical and microbiological contaminants. Our results are evaluate water pollution of some chemical and microbiological contaminants, which are difficult to evaluation through traditional methods.
The stress – strength model is one of the models that are used to compute reliability. In this paper, we derived mathematical formulas for the reliability of the stress – strength model that follows Rayleigh Pareto (Rayl. – Par) distribution. Here, the model has a single component, where strength Y is subjected to a stress X, represented by moment, reliability function, restricted behavior, and ordering statistics. Some estimation methods were used, which are the maximum likelihood, ordinary least squares, and two shrinkage methods, in addition to a newly suggested method for weighting the contraction. The performance of these estimates was studied empirically by using simulation experimentation that could give more varieties for d
... Show More