In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show Moreالشرط المانع من التأجير هو عبارة عن قيد اتفاقي يرد في عقد الإيجار مقتضاه تقييد حرية المستأجر من التصرف في حقه بالإيجار من الباطن أو التنازل عن الإيجار إلا بموافقة المؤجر.وهو بذلك قيد إرادي يرد على حرية المستأجر في التصرف بحقه الناشئ عن عقد الإيجار استثناءً من الأصل العام، وهذا الشرط أما ان يرد على منع المستأجر من التنازل عن الإيجار إلى الغير أو الإيجار إلى الغير من الباطن أو كلا الحالتين، وهو أما أن يظهر بصورة
... Show Moreتم الحصول على 4 عزلات من بكتريا Bacillus sp ودرست قدرتها على انتاج الكايتنيز حيث اظهرت نتائج الغربلة الكمية ان العزلة Bacillu sp A3 هي الاغزر انتاجا وبلغت الفعالية النوعية 3.8وحده/ملغم بروتين.
This study, establishes two stochastic monotonicity results concerning the run length of an upper one –sided Exponentially Weighted Moving Average (EWMA) control charts, based on the logarithm of the sample variance, for monitoring a process standard deviation, these properties cast interesting light on the control chart performance, and their extension to other one –sided EWMA control charts.
The presence of residual antibiotics in water results in the development of antibiotics resistant genes. The available wastewater treatment systems are not capable of removing such antibiotics from sewage. Thus, antibiotics need to be removed before the discharge of wastewater. Adsorption is among the promising techniques for the wastewater treatment to aid the removal of a wide range of organic and inorganic pollutants. The present work is a contribution to the search for an economical method for the removal of low concentrations of amoxicillin (AMX) from water by adsorption on water treatment residue, WTR, taken from a local drinking water facility. The chemical composition and the adsorptive characteristics of the material were first
... Show MoreThe research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.
تعد النصوص المسمارية من اهم الوثائق التي رفدتنا بمعلومات غزيرة عن واقع الحياة اليومية في العصر البابلي القديم المتميز بتطور النشاط الاقتصادي فيه وازدهاره. وتضمن هذا البحث دراسة وتحليل لخمسة نصوص مسمارية اقتصادية غير منشورة وهي من نصوص المتحف العراقي (المصادرة) المجهولة الموقع والمصدر وهي ذات مضامين اقتصادية , ولم نستطع اثبات عائدية النصوص وذلك لانها لاتحمل صيغ تاريخية تشير الى عائدتيها باستثناء النص الا
... Show MoreIn the current study, a direct method was used to create a new series of charge-transfer complexes of chemicals. In a good yield, new charge-transfer complexes were produced when different quinones reacted with acetonitrile as solvent in a 1:1 mole ratio with N-phenyl-3,4-selenadiazo benzophenone imine. By using analysis techniques like UV, IR, and 1H, 13C-NMR, every substance was recognized. The analysis's results matched the chemical structures proposed for the synthesized substances. Functional theory of density (DFT)
has been used to analyze the molecular structure of the produced Charge-Transfer Complexes, and the energy gap, HOMO surfaces, and LUMO surfaces have all been created throughout the geometry optimization process ut
Changes in mechanical properties of material as a result of service in different conditions can be provided by mechanical testing to assist the estimation of current internal situation of these materials, or the degree of deterioration may exist in furnaces serviced at high temperature and exceed their design life. Because of the rarity works on austenitic stainless steel material type AISI 321H, in this work, ultimate tensile strength, yield strength, elongation, hardness, and absorbed energy by impact are evaluated based on experimental data obtained from mechanical testing. Samples of tubes are extracted from furnace belong to hydrotreaterunit, also samples from un-used tube material are used to make comparisons between these properti
... Show More