Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jun 12 2024
Journal Name
مجلة كلية الكوت الجامعة للعلوم الانسانية
التنظيم القانوني للشرط المانع من التأجير (دراسة مقارنة)
...Show More Authors

الشرط المانع من التأجير هو عبارة عن قيد اتفاقي يرد في عقد الإيجار مقتضاه تقييد حرية المستأجر من التصرف في حقه بالإيجار من الباطن أو التنازل عن الإيجار إلا بموافقة المؤجر.وهو بذلك قيد إرادي يرد على حرية المستأجر في التصرف بحقه الناشئ عن عقد الإيجار استثناءً من الأصل العام، وهذا الشرط أما ان يرد على منع المستأجر من التنازل عن الإيجار إلى الغير أو الإيجار إلى الغير من الباطن أو كلا الحالتين، وهو أما أن يظهر بصورة

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
College Of Islamic Sciences
Saba is a semantic study of examples of pronouns
...Show More Authors

which is much useful in the Arabic Language generally in the Holly Quran especially. It is the pronoun  I have taken in the semantic aspect from it and I have done on the surra sabba which varities  the semantical pronoun in it among the pronoun of the speaker the conscience of the addressee the absent  such the the siprat pronoun that comes in it with the explanation for its importance and its work and this is the subject of the first unit which I advanced it from the concept of the pronoun Linguistically and convention. After that I have lighten in some meanings which I have done in the surrat as a semantic , magnification , proud, reprimand and others which I ended my research I have reached the results from it

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Ruling on combining prayers without excuse when needed
...Show More Authors

Jurisprudence is one of the most honorable sciences in value, and the greatest of them in reward. Through it, the rulings of religion are known. He, may God’s prayers and peace be upon him, said: ((Whoever God desires good, He gives him understanding of religion)), and through it, the legal rulings and what is related to them are known from what is permissible and forbidden.
And prayer is the believer’s ascent to his Lord, with which the heart is at peace and the soul is at ease. If he, may God’s prayers and peace be upon him, was overwhelmed by an issue or something became difficult for him, he would panic in prayer and be reassured by it. It was necessary for the students of knowledge to investigate its aspects and its secrets

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Whoever Abu Dawood said about him is weak in his Sunan
...Show More Authors

Abstract

The research was limited to those whom Imam Abu Dawood

described in his Sunan as weak, so this research does not include

narrators who carried descriptions indicating weakness such as

ignorance or others, nor does it include hadiths that the Imam

described as weak.

The number of narrators whom Imam Abu Dawood described as

weak has reached six narrators, and my methodology was to

mention the words of Imam Abu Dawood, then transfer the

sayings of other advanced scholars, as well as the sayings of

Imam Abu Dawood in his other books, if any, to show the extent

of compatibility between these sayings.

I have reached the following resul

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Melody in Translation of a Selection of Persian Poetry لحن موسیقی در ترجمۀ نمونه های از شعر فارسی
...Show More Authors

     ترجمۀ شعر به آهنگ موسیقی از شاهکارهای فکری که تولیدی علمی ترجمی می آراید به شمار میرود ، چیزی مورد نا راحتی  ونومیدی نسبت به مترجم وجود ندارد ، اگر وی در این راه با تلاش کردنی سیر می رود تا ثمره های آن ترجمه می چیند .

روش پژوهشگر در آنچه از ترجمۀ ابیات شعر فارسی بر آمد ، روشی نوینی می داند  که آن بر هماهنگی آواز الفاظ با یکدیگر اتکای می کند  تا ترجمه دارای آوازی وهماهنگی ، به مرتبه ای موسیق

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 14 2019
Journal Name
Arab Science Heritage Journal
استخلاص وتنقية انزيم الكايتنيز من بكتريا Bacillus sp
...Show More Authors

تم الحصول على 4 عزلات من بكتريا Bacillus sp ودرست قدرتها على انتاج الكايتنيز حيث اظهرت نتائج الغربلة الكمية ان العزلة Bacillu sp A3 هي الاغزر انتاجا وبلغت الفعالية النوعية 3.8وحده/ملغم بروتين.

View Publication Preview PDF
Publication Date
Sun Apr 28 2019
Journal Name
Arab Science Heritage Journal
تحقيق تحقيق القسم الثاني من مخطوطة خبرة الفقهاء
...Show More Authors

In fact, the main idea of ​​the manuscript is to deal with  subdivision science of Islamic jurisprudence, it has a touch of ambiguity that attract all knowledge men , many students like to study it according to its ambiguity and trying to solve

View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
دراسات في التاريخ والاثار
unpublished cuneiform texts from the Iraqi Museum (confiscation)
...Show More Authors

The research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.

Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
legitimacy           Revolution of Imam Hussein From an Islamic perspective
...Show More Authors

The sole aim of the tribe of the Messenger of Allah (PBUH) and his basilica was to revoke the Umayyad heresy and to refute the suspicions through which they climbed to the top of the pyramid of power and legitimized the leadership of Muslims (heresy of hereditary rule) with the sword and blood. Therefore, Imam Hussein (peace be upon him) began his Ashura process with his short divine message in its words and great in its vocabulary and content and even the future of Mohammedan Islam over the times and spaces - what we will see in the folds of research, God willing.

View Publication Preview PDF