In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The period of the reign of King Ghazi saw many disorders in most parts of the country and the management disrupted and imbalanced, besides tribal unrests and political conflict and collision with British interests, Such as bad management in some regions and loss of government control over some administrative units, due to the position of the weak governments towards these problems, so it was necessary to change these Governments and Ministers to solve such problems. In contrast, the Iraqi government has focused on the army as the basis for a strong state and the protector on the existence of an external threat for the safety of the country, King Ghazi has helped in the development of competencies of the military, bringing the officers ex
... Show MoreNatural convection in a trapezoidal enclosure with partial heating from below and symmetrical cooling from the sides has been investigated numerically. The heating is simulated by a centrally located heat source on the bottom wall, and four different values of the dimensionless heat source length, 1/5, 2/5, 3/5, 4/5 are considered. The laminar flow field is analyzed numerically by solving the steady, two-dimensional incompressible Navier-Stokes and energy equations. The Cartesian velocity components and pressure on a collocated (non-staggered) grid are used as dependent variables in the momentum equations discretized by finite volume method; body fitted coordinates are used to represent the trapezoidal enclosure, and grid generatio
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
In this paper an estimator of reliability function for the pareto dist. Of the first kind has been derived and then a simulation approach by Monte-Calro method was made to compare the Bayers estimator of reliability function and the maximum likelihood estimator for this function. It has been found that the Bayes. estimator was better than maximum likelihood estimator for all sample sizes using Integral mean square error(IMSE).
This study aims to impact statement played by banking governance according to the decisions of the Basel Committee in achieving the strategic objectives of the banks, But order to achieve the this goal has been the adoption of two hypotheses in addition to the two main hypotheses as sub answered preliminary The study seeks to verify their health and two (no correlation relationship and impact between Banking governance and achieve strategic objectives), has been tested hypotheses. Study has reached
... Show MoreThe aims of research is to identify the role of strategic human resource management Practices in organizational performance improvement in the Baghdad soft drinks company, as well as the implications of the results for both managers and practitioners.
In order to achieve the objectives of the research, the researcher designed questionnaire included (40) items to collect the initial data from the research sample consisting of (53) Single. In light of that has been collecting and analyzing data and test hypotheses using the statistical package for Social Sciences (SPSS21), and use a number of statistical methods to achieve the goal of the research, including the means, standard deviations and simple correla
... Show MoreIn this paper, for the first time we introduce a new four-parameter model called the Gumbel- Pareto distribution by using the T-X method. We obtain some of its mathematical properties. Some structural properties of the new distribution are studied. The method of maximum likelihood is used for estimating the model parameters. Numerical illustration and an application to a real data set are given to show the flexibility and potentiality of the new model.
The research seeks to identify the proposed scenarios to predict and ward off monetary credit risks that the bank is exposed to in the future, using the banking stress tests model, and showing their impact on capital adequacy and profitability ratio,To achieve this purpose, Sumer Commercial Bank was taken as a case study, and mathematical equations were used to extract the results. Low percentage of profits and returns, strictness in the process of granting credit and financing operations in order to reduce credit risks.
Diazotization reaction between quinolin-2-ol and (2-chloro-1-(4-(N-(5-methylisoxazol-3-yl)sulfamoyl)phenyl)-2l4-diazyn-1-ium was carried out resulting in ligand-HL, this in turn reacted with the next metal ions (Ni2+, Pt4+, Pd2+, and Mn2+) forming stable complexes with unique geometries such as (tetrahedral for both Ni2+ and Mn2+, octahedral for Pt4+ and square planer for Pd2+ ). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, fourier transfer proved the formation of azo group and the coordination with metal ion through it. Pyrolysis (TGA &
... Show More