In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The current research aims to diagnose the role of social responsibility as a contributing factor in enhancing the quality of services provided by the public sector in Iraq, where the research sought to demonstrate the relationship and impact of social responsibility dimensions (economic, legal, moral, and human) on the sector Services related to the electric field in Nineveh governorate because of its importance and its direct relationship with the citizen especially after the end of military operations in the destruction of the electricity sector by a large percentage in the city of Mosul. Nineveh Electricity Distribution Directorate / Center was chosen as a research community including (administrators and staff) of the research
... Show MoreThe current research attempts to examine the relationship between social-psychological conflict and their relation to family upbringing approaches among the adolescents of intermediate stage according to sex and economical level. To do this, the researcher prepared a questionnaire to measure social-psychological conflict that consisted of (32) item divided on four dimensions, and also she prepared a questionnaire to measure family upbringing approaches which composed of (28) item divided on four dimensions. The sample was (260) male and female student from intermediate stage chosen randomly. The results revealed that there were significant differences between social-psychological conflict which went to male, there was a negative correlat
... Show MoreThe purpose of this research is to identify heritage and highlight its value by drawing on its decorative vocabulary and integrating it with the Arabic calligraphy to revive the heritage in a contemporary style, and to create decorative design units inspired by Sadou and Arabic calligraphy and to employ them in the modern fashion designs. The applied descriptive approach has been used in this research, and the research community is made of women in Riyadh area. The tools used in this research were the questionnaire and the observation. The most important results of the research are: the design of decorative units from the integration of Arabic calligraphy and the decorations of the Saduo, and the use of these units in the design of the o
... Show MoreResearch Summary
This research is an attempt to explain the Qur’anic verses of the vision in the practical divine vision on the Day of Resurrection, and the legal texts narrated from the Companions regarding the vision of the Prophet, may God’s prayers and peace be upon him, regarding the vision of the Prophet, may God bless him and grant him peace, regarding the vision of the Prophet, may God’s prayers and peace be upon him, regarding the vision of the Prophet, may God bless him and grant him peace He was greeted with regard to vision, and he explained the two sayings of Ibn Abbas and Aisha on the same subject, including an area of conflict between them.
The research aims to identify the impact of the merger of the companies affiliated to the Ministry of Industry and Minerals on their financial profitability since the companies before the merger suffered a rise in losses and the deficit reached very high levels that affected its overall performance and even on the morale of workers as losses are increasing and solutions Efficiency is absent. The problem stems from knowing the impact of the merger on the profitability ratios of the companies. The research field was represented by the companies affiliated to the Ministry of Industry and Minerals (21) companies, while the research sample reached (6) companies after the merger (14) companies before the merger, was based on data The f
... Show MoreThe Muslim woman actively participated in narrating, preserving, controlling and maintaining the hadith, along with her brother, the man who later became an inexhaustible representative of the effort to preserve, control, and narrate the Sunnah. Undoubtedly, the mothers of the believers, may God be pleased with them, had a great advantage in communicating Islam and spreading the Sunnah of the Prophet Especially among women, all of them heard from him, may God’s prayers and peace be upon him, and lived with him in the details of his life on the disparity between them in memorizing and narrating and publishing them. It narrated (378) recently, and it is considered the second narrator after the mother of the believers Aisha, may God be pl
... Show MoreThe research is based on the basic idea that companies today are moving towards a new trend towards protecting the environment coupled with the increasing wareness of the pollution damage caused by these companies due to their operations and activities in the environment. The two main reasons that led the researchers to choose this subject is the need to adapt the companies themselves in response to successive developments, The great development was that companies moved from the sole economic responsibility of the business to social responsibility by emphasizing socially responsible profit. The problem of research is the knowledge of the availability of the dimensions of the green processing series in Kirkuk Cement Factory The re
... Show MoreThe objective of this study is to determine the extent to which the determinants of organizational support contributed to enhancing the mental status of banking services in a number of banks in Dohuk governorate in order to diagnose the correlation between the perceived organizational support and the mental status of services. Availability in the environment of banks and to enhance the mental position from the point of view of customers as the main hypotheses focused on the nature of the relationship between the dimensions of research among them has been tested these hypotheses using statistical and descriptive methods have been The study concluded that the contribution of organizational support, which is
... Show MoreThe research discusses one of the most critical issues of corporate finance which is related to asset utilization efficiency. Researchers used internal growth rate as independent variable (Proxy of asset utilization efficiency) and sustainable growth rate-dependent variable (proxy of stockholders wealth). According to these two variables, researchers formulate major hypotheses (There is no significant effect of internal growth rate on sustainable growth rate), as well as two sub-hypotheses, examine the components of major variables. Sample of Iraqi industrial companies which listed in the Iraqi stock exchange selected to test and examine main hypotheses. Result of simple and multiple regressions explain there is a significant effect of i
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More