Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Lactic Acid Bacteria (LAB) with Probiotic Potential from Dengke Naniura
...Show More Authors

Dengke Naniura is a traditional food from Sumatera Utara, Indonesia, that is produced through fermenting process, and this food is believed to contain high probiotics. The objective of the current research is to determine the potential of LAB as a probiotic that has been obtained from Dengke Naniura. Dengke Naniura was traditionally prepared from Cyprinus carpio. Four LABs have been successfully isolated from Dengke Naniura, such as D7DA3, D7B3, D7DBF and D7DN3. Those four LAB isolates were identified as Lactobacillus sp. This result has been confirmed by the non-spore forming bacterium, non-motile, and Gram-positive. Also, it has been supported by biochemical test, for the example Voges Proskauer, catalase test, Methyl

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
Transformations of the body from traditional expression to subjectivity : Marina Abramivic as a model.
...Show More Authors

The way artists deal with body in their artistic works has had so many forms and methods, whether as an object for their drawings or as a material to create live artistic performances that relate to the idea of correspondence and interaction between different artistic categories such as: drama, dance, and painting as it is the case of the artist Marina Abramovic who has always used her body as an artistic unit to generate meaning and to perform her lively shows.
To go deeper into her career, our work was divided into 3 sections:
The first section was devoted to follow the main artistic stages that her body had gone through, starting with paintings she performed using concepts based on acting, simulation and nudity and ending wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of paid the offices of the Inspectors General on mutation fraud Crimes
...Show More Authors

       Fraud crimes, which is a form of crimes against the funds in public office, is one of the crimes of traditional and cutting-edge in the same time, but it took a distinct character from other traditional crimes because of what is based upon, behavioral fundamentals and foundations and expressive image of personal qualities, concentrated in the mental work, the inventive sophistication, and skillful abilities of the perpetrators of these crimes, in addition to what is owned by crooks today a behavioral ability represented in underestimating laws and instructions. Fraud is considered one of the organized crime methods It is the most important method of its methods, all crimes practiced by the cro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Arab Science Heritage Journal
المجتمع المدنـــــــي في العراق " إشكالية الارتقاء من المفهوم إلى الظاهرة "
...Show More Authors

يعتبر مفهوم المجتمع المدني من بين سلة المفاهيم التي حملت لوائها واعادت رفعها حركات الموجة الثالثة من الديمقراطية في العالم التي نادت بالتعددية والانتخابات الحرة ...الخ .

View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Evaluation of Altruistic Behavior for Kindergartens Children from their Mothers & Teachers Point of view
...Show More Authors

Abstract

 This study is aim to :

  • Put a standard to evaluate the altruistic behavior in kindergarten children.
  • Know level of the altruistic behavior in the kindergarten children according to their mother "s points of view.
  • Know the level of the altruistic behavior in the kindergarten children according to their teacher "s points of view.
  • The differences in the level of altruistic behavior in kindergarten children between their mothers & teachers points of view.

      The sample consists of (120) children of kindergarten children in Baghdad. The researcher has built a to

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
سومر
unpublished cuneiform texts from daynisty of larse (2005-1763 B.C)
...Show More Authors

After the fall of the Third Dynasty of Ur at the hands of the Elamites during the reign of its last ruler, King Ibi-Sin, the Amorites continued to flow more into Mesopotamia in the form of large migrations that established a number of contemporary and conflicting ruling dynasties that formed the Old Babylonian era. Among these dynasties was the Larsa dynasty, founded by King Nablanum in the city of Larsa. The fourth king who ruled in the Larsa dynasty, Gungunum, was one of the most powerful kings who stood up to the Isin dynasty, which had until that time enjoyed great political superiority in the country. The kings who ruled after him expanded their influence and controlled a number of cities, especially the cities of Nippur and Uruk, whic

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
حوليات اداب عين شمس
فعل الامر من صيغة N المبني للمجهول في اللغة الاكدية
...Show More Authors

يتناول هذا البحث موضوع (( فعل الامر في صيغة المبني للمجهول في اللغة الاكدية )) وهو يتعلق بقواعد اللغة الاكدية , وقد تضمن هذا البحث مقدمة وشقين : صيغة المبني للمجهول وفعل الامر. اما ما يخص المقدمة فقد شملت تعريف الفعل وانقساماته حسب قوة احرفه , الجذر , المعنى , والفاعل , كما تضمنت المقدمة أيضا الحديث عن الصيغ الفعلية الرئيسة الأربعة التي يتألف الفعل الاكدي منها إضافة الى الصيغ الثانوية التي تتضمنها الصيغ الرئيسة . و

... Show More
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Disney’s Girls: The Development of Persona from Snow White to Pocahontas
...Show More Authors

Through his female characters, Walt Disney was able to reflect the
development of the general outlook upon women in the Western world over a period
of sixty years.
This paper sheds light in how the cartoon characters changed in their reaction
to problems and means of solving them from the 30s through to the 90s of the
previous century. The main characters will be seen according to the films’ dates of
production and release.

View Publication Preview PDF
Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting system in the recovery from the impact of financial crisis
...Show More Authors

          This study aims to identify the concepts of financial crisis and its reasons of creation , also explain the effects of the accounting disclosure and the International Accounting Standards in current financial crisis, In addition to,  indicate the role of accounting in the reform of the financial system from the impact of financial crisis.      

       The  methodology of this study orientied to two main aspects, the first is an identifying approach through exploring the opinion of financial experts, the second aspect is based on an analytical approach to satisfy the requirements  of experts to get there opi

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref