In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The aim of the present research is to construct a model to evaluate the software engineering subject in the third grade department of Computing, in colleges of education. Then, evaluating the software Engineering subject from the view point of staff members by applying the constructed model, and in order to achieve the second aim of the present research the researcher has to find answers to the following questions:- 1. What is the presence of the proposed evaluating model fields, which was prepared by the researcher for the third grade Soft Ware Engineering subject from the view point of staff members? 2. What is the presence of the items for the proposed evaluating model, which was prepared by the researcher for the third grade Soft War
... Show MoreThe research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.
This research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show More
The stories of children in Iraq during the past two decades have received a number of important scientific studies. Despite tyranny of the historical study method on most of these studies, they have been and still are very important, because they have established a chronicle of this literary style that has been neglected and based not only on the academic level and serious in-depth university studies but also on the enclosed sight that doesn’t consider studied art as an innovation with its specificity and its typical technical components. While many of the public impressions and self-reflections contributed to the dominance of some of the provisions and concepts that were circulated as critical remarks and adopted by som
... Show MoreUnter Exilliteratur versteht man „die literarische Produktion von Autoren, die wegen politischer, religiöser oder rassistischer Verfolgung gezwungen sind, sich an einem anderen als dem von ihnen gewünschten Lebens- und Arbeitsort aufzuhalten.“[1] Deswegen unterscheidet sich „Migration“ von „Exil“ dadurch, dass sie freiwillige Auswanderung ist. Bereits in der Antike und auch im Mittelalter gab es Schriftsteller, die vor Zensur oder politischer Verfolgung ins Exil geflohen sind, wie zum Beispiel der griechische Satiriker des
... Show MoreThe energy consider generally and specifically the petroleum energy
from the prior requirement of the population and nations, and the basics of the
survival of mankind and all the challenges for the sake of continuum, so
without this energy the life of ankind being varied, so far the life is still as a
fact on the planet earth, and suppose the life may continue as the willing of
Allah ,that the events and the standards and the degree of development is still
as it is, in another word no any technical developments and no any
entertainment no transportation and also there is no demographic domination
for the whole lands belonging to Allah, certainly no way to talk more on what
we and the others knew, what is the g
The period of the reign of King Ghazi saw many disorders in most parts of the country and the management disrupted and imbalanced, besides tribal unrests and political conflict and collision with British interests, Such as bad management in some regions and loss of government control over some administrative units, due to the position of the weak governments towards these problems, so it was necessary to change these Governments and Ministers to solve such problems. In contrast, the Iraqi government has focused on the army as the basis for a strong state and the protector on the existence of an external threat for the safety of the country, King Ghazi has helped in the development of competencies of the military, bringing the officers ex
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
The research considers The Analysis Dimensions of The organizational citizen ship Behavior for a sample of the Faculty of the university of Baghdad through the five Dimensions of citizenship ((Altruism– couscientiosness– sportsmanship courtesy– civic virtue))
The sample contains (120) professor from four colleges of the Baghdad university.
The most Important conelusion is the rise of citizenship behavior level for the Iraqi professor through his generaliaed compliance for most dimensions of the citizenship behavior the most important recommanelations presenteel in research is the encouragement and development for this behavior because of its oby viosis impact on the p
... Show MoreResumen:
El presente trabajo intenta analizar las características del lenguaje jurídico español a cuya estructura se debe su complejidad. A la vez, damos una descripción detallada de sus rasgos morfosintácticos, léxico-semánticos y estilísticos. En ningún momento, pretendemos fijar unas pautas o normas para la traducción de este lenguaje que requiere unos previos conocimientos jurídicos y cierta preparación para proceder a realizar esta tarea. Nuestra intención es, simplemente, ofrecer al lector árabe una pequeña visión de lo difícil que es comprender los textos legales españoles hasta para los nativos para imaginarse las posibles dificultades a la hora de iniciar a traducirlos.