In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
شهدت معظم المدن السومرية أزدهاراً أقتصادياً خلال عصر أور الثالثة ،أنعكس ذلك من خلال النصوص المسمارية المكتشفة ذات المضامين الاقتصادية المتنوعة ومنها (وصولات تسلم Bullae) التي تميزت بعصر أور الثالثة بأشكالها المتعددة ومنها: الكروية والمربعة والمستطيلة والمثلثة والمضلعة ومعظمها يحتوي على طبعات أختام فضلاً عن أنها تكون مثقوبة طولياً لغرض التعليق.
Judo has witnessed tremendous developments since its inception until the present day. It has been distinguished by its adaptation to the various challenges it has faced throughout the ages. Judo is one of the sports that have been affected by social, technological and cultural changes. These changes reflect its transformation from the traditional Japanese martial art to a global sport practiced. All over the world, therefore, studying the historical development of judo is important, as it provides valuable insights into the development of martial arts over a century, by studying the origins, principles and techniques of judo for the period (1880 - 1980), and also enables us to gain an understanding A deeper understanding of how the art form
... Show MoreWrong behavioral deviations among youth witnessed an obvious growing, some of these deviations are, robbery, drug and internet addiction, and smoking. Additionally, intellectual extremism and the disrespect of the traditions and genuine customs, In light of this issue, the research aims to shed light on the educational and preventative role of the woman in protecting and immunizing children from the wrong behavioral deviations. The woman has a significant and influential role in the society in general and in her family, in particular to the responsibility lies on her. The research shed light on the manifestations of behavioral deviation in children and the mechanisms of prevention and treatment. The research concluded with a set of recom
... Show Morethe pursue of social systems history present to us solid evidence that the collapse of that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate auto adaptation mechanism and use it excellently in the right time.
The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob
... Show MoreWater scarcity is one of the most important problems facing humanity in various fields such as economics, industry, agriculture, and tourism. This may push people to use low-quality water like industrial-wastewater. The application of some chemical compounds to get rid of heavy metals such as cadmium is an environmentally harmful approach. It is well-known that heavy metals as cadmium may induce harmful problems when present in water and invade to soil, plants and food chain of a human being. In this case, man will be forced to use the low quality water in irrigation. Application of natural materials instead of chemicals to remove cadmium from polluted water is an environmental friendly approach. Attention was drawn in this research wor
... Show MoreIslamic civilization derived its religious law from Quran and sunnah which took care of human as a benefit person in life and how it treat with it , and because the civilization takes care of human , it would take also in his health , manners ,body and this is the aim of Islamic civilization ,all religious emphasize on Islamic laws and on helping poor people or weakness one.
The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the
... Show Moreملامح من فكرة القانون الطبيعي في حضارة العراق القديم
Still Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations
T
... Show More