In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreAbsract
The letters of the Al-Safa Brothers contain many tales, in which each story is a literary text that is independent from the other texts, but it constitutes a unified entity in its entirety, because these stories contain recurring structural elements that go into building each one of them. The stories - the subject of the analysis - were not keen on something that was keen on adhering to the Sufi vision and its apparent effect on the tales of the messages, starting with the announcement of the narration to the narrator and his attempt to persuade the recipient of the truth of what is being told and its realism, and made him believe it. The stories correspond to the formal construction of the ideal style defined by th
... Show MoreLet be a non-trivial simple graph. A dominating set in a graph is a set of vertices such that every vertex not in the set is adjacent to at least one vertex in the set. A subset is a minimum neighborhood dominating set if is a dominating set and if for every holds. The minimum cardinality of the minimum neighborhood dominating set of a graph is called as minimum neighborhood dominating number and it is denoted by . A minimum neighborhood dominating set is a dominating set where the intersection of the neighborhoods of all vertices in the set is as small as possible, (i.e., ). The minimum neighborhood dominating number, denoted by , is the minimum cardinality of a minimum neighborhood dominating set. In other words, it is the
... Show MoreEndophytic bacteria produced analogous secondary metabolites of their hosts. Similarly, the ability to generate antioxidants is not an exception. Dragon scales (Pyrrosia piloselloides), an epiphytic plant of the Polypodiaceae family, are frequently overlooked. This research aims to isolate antioxidant-producing bacteria from dragon-scale fern leaves. The antioxidant activities were tested after the extraction procedure using ethanolic extract. Bacteria were characterized and selected as candidates for antioxidant production by screening for the production of total phenolic compounds. Antioxidant levels were determined utilizing the ABTS, FRAP, and DPPH techniques. The preliminary findings of the entire phenolic compound test rev
... Show MoreThe study aims to identify the concept of empowering women from the point of view of experts in the Palestinian society, specifically in Gaza, as well as to explore the foundations of their formation of this concept. Additionally, the study seeks to clarify the most important challenges facing the empowerment of women in Palestinian society. The study used the design of a grounded theory that seeks to build the theory through deep analysis of the data, as qualitative data were collected through holding two focus groups and six in-depth interviews with the study sample, who were selected by the method of targeted sampling. The sample included (16) individuals (9 female experts, 7 male experts) holding academic and community leadership pos
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreThis study is about awareness of teaching explanation difficulties in the Islamic university from the lecturers point of view. It discussed the difficulties and the traditional teaching methods of explanation. The study concentrated on teaching Islamic studies in general and teaching explanation in specific and set difficulties so as to be treated.
The study is of three chapters, the first contains the difficulties in several aspects like the educational goals, text contents, teaching methods and styles, students, educational techniques, educational aids and evaluation, it addition to the lecturers of Islamic university colleges in 2009-2
... Show MoreViolence is a very serious phenomenon affecting the upbringing and culture kids, are playing the most violent forms of development of these Phenomenon, the research aims to determine the role of the media in reducing violence, and conducted a field study on parents Children by 200 form, the results revealed the importance of the media in raising awareness of the risks of violence on the child Especially television, which hugely increased Show features, as well as the role of parents in guiding the child to buy Useful because the game to play negative impact of violence on children's health, and the media play an important role in raising awareness of these Risks through educational programs and television commercials, and o
... Show MoreAfter the fall of the Iraqi regime in the 9th of April 2003, and after the disintegration of the country, political and party political chaos that had never been witnessed before, has now taken over. In the past 2 years, the American military forces had a primary role in spreading this chaos and disorder by applying a set of wrong measures and policies. This chaos that is still affecting the iraqi people was completely ignored by the USA even 2 years after the occupation, no serious steps have been taken in order to bring back order and security, on the other hand, most of the government institutions and its forces were disintegrated, along with the decision made by Paul Bremer of dismissing all the iraqi journals and the workers of the
... Show MoreThis study sheds light on the structure of the phoneme composition of the verses describing the servants of the Most Merciful in Surat Al-Furqan, and on how its silences, voices, and syllables are distributed, questioning and talking to them about their condition, their aesthetics, and the accuracy of Quranic employment for them, stemming from the presence of a strong, inseparable bond, and a close relationship between the voice and meaning As (i.e. the voice) is the nerve of speech, forming the basic building blocks of speech through synergy of syllables and syllables with each other, creating an audio context with a rhythm that is parallel, expressive, and in harmony with the content, as the vocal context and the fabric based on it are
... Show More