In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o
... Show MoreThe research aims to shed light on the recent experience in the Iraqi business environment, which is the experience of the merger. To evaluate a recent experience in an important sector of the Iraqi business sectors, namely the industrial sector to enable decision-makers to review that experience to judge the extent of its success and address some of the lapses that experience that by measuring synergies can be judged on the success of the merger experience or not. The research community is the governmental industrial sector. The research sample included six cases of merger (14) companies before the merger. The Holt method was used to predict the net sales and total cost values before the merger as if it were not merged. Th
... Show MoreThe study aims at investigating the quality of internal auditing and its impact on nature, timing, and procedures of external audit, based on international auditing standards, in particular ISA (610). The standard ISA (610) requires the external auditors to assess independence, the scope of internal audit unit, competence, and due professional care of internal auditors as indicators that reflect the quality of internal audit performance before deciding to rely on internal auditors.
The sample of this study consisted of external auditors in Iraqi Solidary Companies for Auditing. A questionnaire was distributed to them via e-mail
... Show MoreManagement Representations Letter plays a significant role as an evidence to get conclusions the Auditor is looking for. These conclusions could show the professional opinion of auditor over the fairness and integrity of financial statements for many issues and numbers that management claims, Hereby, the research aims at highlighting the importance of Management Representations Letter and the way of using as an evidence with expressing its meaning and means of application in addition to identify the Responsibility of Auditor on that Letter, This research discusses also the effect of Management Representations Letter on the credibility of financial statement and enhancing the credibility of the submitted reports, From other side, in the t
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreThe research aims at considering the reality of cognitive bias and organizational inertia as determinants of strategic change in a sample of companies listed in Amman Stock Market. To achieve objectives of the research, a model consisting of two independent variables has been designed, namely:
(1) The cognitive bias resulting from (escalating commitment, analogy, previous assumptions, representative generalization, command and control, convergent thinking), and (2) Organizational inertia due to (Icarus discrepancy, power distribution, rooted organizational culture), and a dependent variable, strategic change in (leadership patterns, strategy, the organization per se).
From the model two main hypotheses were derived;
... Show MoreThis research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o
... Show MoreNine new compounds of 2-amino-5-chlorobenzothiazole derivatives were synthesized. These new compounds were formed through the reaction of 2-amino-5-chlorobenzothiazole 1 with ethyl chloroacetate and KOH, which gave an ester derivative 2, followed by refluxing compound 2 with hydrazine hydrate to afford hydrazide derivative 3. The reaction of compound 3 with CS2 and KOH gave 1,3,4-oxadiazole-2-thiol derivative 4, and then the reaction of compound 2 with thiosemicarbazide to produce compound 5 then treated it with 4%NaOH led to ring closure to provide 1,2,4-triazole-3-thiol derivative
... Show MoreThe current research discusses “The impact of the critical factors for the transfer of knowledge on opportunities and strategic success ", the attention have been increased on knowledge transfer and strategic success subjects because on being one of the important and contemporary issues, which have a significant impact on the existence of organizations and its future. The research aims to identify the critical factors for knowledge transfer in private high education environment which enables (the college community surveyed) to achieve strategic success, also the research sought to answer questions related to research problem by testing a number of major and minor hypothes in impact, in order to test the hypotheses I used a fiel
... Show MoreThe TV plays an active role in building the general culture of the recipients, which calls for emphasizing its contemporary mission in rebuilding the values that support the development and modernization of diverse societies. Such importance is necessary to explore the challenges facing the cultural invasion, The space opening, which had its cultural returns to the societies, produced a space for alternative values and antagonisms in the cultures and traditions of these societies in the midst of a psychological / social conflict behind a clash with the peculiarities of Muslim societies. Cultural Adtha.
From these points of view, and because the universities are an important stage to announce the demands of the advocates of change and