In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
تسعى تركيا ضمن سياساتها المائية ومنذ زمن بعيد وبأصرار على تنفيذ المزيد من بناء السدود والمشاريع التخزينية المائية على حوضي دجلة والفرات، الامر الذي يؤدي بالضرورة الى تناقص معدل الواردات المائية لنهري دجلة والفرات الداخلة للاراضي العراقية .وبالتالي التأثير على مقومات التنمية الزراعية العربية بشكل عام والتنمية الزراعية بالعراق بشكل خاص ومن ثم تهديد الامن الغذائي الوطني.
لذا فأن البحث يهد
... Show MoreThe Supreme Judicial Council decided on July 3, 2003, to set up a court to deal with the issues of publication and media. This court tries to solve the problems of media and publishing in both its civil and penal aspects. The decision of establishing the court represents a new and important step to be taken by the Iraqi Judicial Council for the tremendous development witnessed by media sector in general and press in particular especially after 2003.
This study includes two main axes: the first one deals with the most important crimes of publication in the Iraqi legislations such as the crimes of defamation, libel, insult, indecency, and incitement; the second deals with an analytical survey of the completed cases i.e. the issues tha
The study aimed to identify how to raise grateful children from an Islamic educational perspective. For that objective to be achieved, the researcher used both of deductive and descriptive approaches using the method of documentary research. The study's results show that children are the real wealth of the community and the foundation of cultural building; therefore, paying attention their raising is a responsibility that must be shared by everyone; gratitude is part parcel of the Islamic doctrine, which is one of the greatest virtues; the virtue of gratitude is the attitude of the believers which in turn strengthens the bonds and expands the network of positive social relationships; It is also considered a cultural significance
... Show MoreThe problem of the study lies in the need for standing on the justifications, reasons and difficulties that face the scientific research matter at Baghdad university. The importance of this study lies in the fact of being scientific research one of the most important methods in developing the teaching members performance efficiency which contributes in teachers contact with the modern developments that emerge in work. That matter which reflexe on the educational process and the scientific production in their universities.
And the research goal is summarized in identifying the difficulties that is facing the scientific research at Baghdad university from the point of view of the lecturers, and also to ide
... Show MoreThis article conclude a theoretical study for the possibility to produce additional electric power from Iraqi steam power plants by cutting – off high-pressure feed water heaters . Three separated steam power plants which Dura , south –Baghdad and Nasria were studied . The investigation showed the possibity of increasing the electric power from 10 to 15% for Dura and Nasria , whereas 6% for south – Baghdad . According to the nowadays of operation to Iraqi steam power plants , the results showed that by cutting–off high pressure feed water heaters we can generate additional electric power about 250 MW during 3-4 hrs. daily. In addition, the fuel consumption can be reduced in comparison with diesel generat
... Show MoreNumber theorists believe that primes play a central role in Number theory and that solving problems related to primes could lead to the resolution of many other unsolved conjectures, including the prime k-tuples conjecture. This paper aims to demonstrate the existence of this conjecture for admissible k-tuples in a positive proportion. The authors achieved this by refining the methods of “Goldston, Pintz and Yildirim” and “James Maynard” for studying bounded gaps between primes and prime k-tuples. These refinements enabled to overcome the previous limitations and restrictions and to show that for a positive proportion of admissible k-tuples, there is the existence of the prime k-tuples conjecture holding for each “k”. The sig
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThe paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
The Subject of contritutions to Jerusalemites Scientific in Egypt from 8.5 Century 14.11 AD of noteworthy studies Concern Coming Of these Scientists to Egypt has helped toth to Seek Knowledge and Study or teaching in the tooming w0rid of Science broadly and distinctive through Scientific interaction and intermingling of Civilization between Scientists this Mixing effect of the Scientific life and in tellectal of The nam
... Show Moreهدفت الدراسة الى تحديد الكفايات التدريسية اللازمة للطالبات- المدرسات من وجهة نظرهن وذلك للتعرف على مدى حاجتهن لهذه الكفايات التدريسية التي ينبغي امتلاكها لتحقيق الاهداف المنشودة.أشتملت عينة البحث على(100) طالبة من جامعة بغداد/كلية التربية للبنات/قسم التاريخ.تم اعداد اداة البحث وهي أستبانة مكونة من (43) فقرة خماسية البدائل هي (موافقة بشدة، موافقة،مترددة،غير موافقة،غير موافقة بشدة) موزعة على
... Show More