Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
The Significance of the Folk Symbols and Their Influence on The National Identity (Chosen samples from the Contemporary Iraqi Pottery): زينب كاظم صالح
...Show More Authors

The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The role of corporate merger in achieving synergy (Analytical research in a sample of companies of the Iraqi Ministry of Industry and Minerals)
...Show More Authors

The research aims to shed light on the recent experience in the Iraqi business environment, which is the experience of the merger. To evaluate a recent experience in an important sector of the Iraqi business sectors, namely the industrial sector to enable decision-makers to review that experience to judge the extent of its success and address some of the lapses that experience that by measuring synergies can be judged on the success of the merger experience or not. The research community is the governmental industrial sector. The research sample included six cases of merger (14) companies before the merger. The Holt method was used to predict the net sales and total cost values ​​before the merger as if it were not merged. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Quality of internal audit and its impact on nature, timing and procedures of external audit An investigative study of a sample of external auditors Iraqi Solidary Companies for Auditing.
...Show More Authors

           The study aims at investigating the quality of internal auditing and its impact on nature, timing, and procedures of external audit, based on international auditing standards, in particular ISA (610). The standard ISA (610) requires the external auditors to assess independence, the scope of internal audit unit, competence, and due professional care of internal auditors as indicators that reflect the quality of internal audit performance before deciding to rely on internal auditors.

The sample of this study consisted of external auditors in Iraqi Solidary Companies for Auditing. A questionnaire was distributed to them via e-mail

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Management Representations Effect on Auditor Responsibility: Applied Research in a sample of Companies under Control and Audit of BSA and private sector auditing offices
...Show More Authors

Management Representations Letter plays a significant role as an evidence to get conclusions the Auditor is looking for. These conclusions could show the professional opinion of auditor over the fairness and integrity of financial statements for many issues and numbers that management claims, Hereby, the research aims at highlighting the importance of Management Representations Letter and the way of using as an evidence with expressing its meaning and means of application in addition to identify the Responsibility of Auditor on that Letter, This research discusses also the effect of Management Representations Letter on the credibility of financial statement and enhancing the credibility of the submitted reports, From other side, in the t

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
...Show More Authors

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Cognitive Bias and Organizational Inertia are Two Functions of Strategic Change An Experimental Study in Amman Stock Market
...Show More Authors

The research aims at considering the reality of cognitive bias and organizational inertia as determinants of strategic change in a sample of companies listed in Amman Stock Market. To achieve objectives of the research, a model consisting of two independent variables has been designed, namely:

(1) The cognitive bias resulting from (escalating commitment, analogy, previous assumptions, representative generalization, command and control, convergent thinking), and (2) Organizational inertia due to (Icarus discrepancy, power distribution, rooted organizational culture), and a dependent variable, strategic change in (leadership patterns, strategy, the organization per se). 

From the model two main hypotheses were derived;

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Numerical Simulation of Unsaturated Soil Water Flow from a Trickle Point System, Considering Evaporation and Root Water Uptake
...Show More Authors

This research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o

... Show More
View Publication
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New 2-amino-5-chlorobenzothiazole Derivatives Containing Different Types of Heterocyclic as Antifungal Activity
...Show More Authors

Nine new compounds of 2-amino-5-chlorobenzothiazole derivatives were synthesized. These new compounds were formed through the reaction of 2-amino-5-chlorobenzothiazole 1 with ethyl chloroacetate and KOH, which gave an ester derivative 2, followed by refluxing compound 2 with hydrazine hydrate to afford hydrazide derivative 3. The reaction of compound 3 with CS2 and KOH gave 1,3,4-oxadiazole-2-thiol derivative 4, and then the reaction of compound 2 with thiosemicarbazide to produce compound 5  then treated it with 4%NaOH led to ring closure to provide 1,2,4-triazole-3-thiol derivative

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
“The impact of the critical factors for the transfer of knowledge on opportunities and strategic success”
...Show More Authors

The current research discusses “The impact of the critical factors for the transfer of knowledge on opportunities and strategic success ", the attention have been increased on knowledge transfer and strategic success subjects because on being one of the important and contemporary issues, which have a significant impact on the existence of organizations and its future. The research aims to identify the critical factors for knowledge transfer in private high education environment which enables (the college community surveyed) to achieve strategic success, also the research sought to answer questions related to research problem by testing a number of major and minor hypothes in impact, in order to test the hypotheses I used a fiel

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Al–bahith Al–a'alami
TV and educating university youth about the challenges of cultural identity in Iraq Field study of a sample of students at University of Baghdad
...Show More Authors

The TV plays an active role in building the general culture of the recipients, which calls for emphasizing its contemporary mission in rebuilding the values that support the development and modernization of diverse societies. Such importance is necessary to explore the challenges facing the cultural invasion, The space opening, which had its cultural returns to the societies, produced a space for alternative values and antagonisms in the cultures and traditions of these societies in the midst of a psychological / social conflict behind a clash with the peculiarities of Muslim societies. Cultural Adtha.
From these points of view, and because the universities are an important stage to announce the demands of the advocates of change and

... Show More
View Publication Preview PDF
Crossref