In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreResearch aims at evaluating the quality of the teaching skills of math teachers in junior high / scientific branch from their point of view.
The researchers prepared for this purpose a quality of teaching skills standards questionnaire, It consisted of 72 items distributed on four axis, The research sample was 200 teachers The researchers used statistical methods: the arithmetic mean, standard deviation, variance test, test Shiva , The results showed a statistically significance difference Attributed to the qualification variable in the second axis (Planning for teaching topics) And the absence of statistical difference function,
... Show MoreTraining has occupied a leading position in a large number of developed and developing countries alike in order to develop the skills of workers in line with the changes and developments of the era, including monitoring compliance in banks, which is one of the most important jobs in banking work to trailing and monitor the bank’s compliance with laws, regulations and instructions in order to achieve its goals Therefore, the problem of this research focuses on the following question: What is the role of training in enhancing banking compliance at the present time? In order to clarify the relationship between the main and sub-research variables, two main hypotheses and three sub-hypotheses were formulated for each hypothesis, and t
... Show MoreThe purpose of this paper is to introduce and study the concepts of fuzzy generalized open sets, fuzzy generalized closed sets, generalized continuous fuzzy proper functions and prove results about these concepts.
يسعى هذا البحث الى تقديم اطار عملي ونظري حول موضوع "تأثير الاقتصاد المنزلي في تعزيز الاداء العالي" وتم اختبار مخطط الدراسة الفرضي في القطاع التعليمي الحكومي في محافظة البصرة ,ويتضمن عدد من تشكيلات الجامعة التقنية الجنوبية. واستخدمت الاستبانة والمقابلة الشخصية كأسلوب لجمع البيانات للدراسة وكان حجم العينة114 موظف. وقد استخدمت عدد من الاساليب الاحصائية لاختبار فرضيات الدراسة. واظهرت النتائج بأن هناك تأثير ايج
... Show MoreIrak Türk ağızları Azeri Türkçesinin bir uzantısı olarak değerlendirilir.Kerkük Türkçesiyle yazılan edebi ürünler, Irak Türkçesinin tamamını ifade etmek üzere kullanılmaktadır. Zamanın Eli divanı Kerkük Türkçesile yazılan bir eserdir. Bu yüzden bu divanı seçtik ve Irak Türkmen Türkçesi , Osmanlı Türkçesi ve Türkiye Türkçesi dilleri arasında karşılaştırmalı bir inceleme yaptık.
Bu araştırma, Irak Türkmen şairlerinden birisi sayılan Es’at Naib’in şiirleri üzerinde uygulamalı bir çalışmadanoluşmaktadır. Bu çalışmada adı geçen şairin “Zamanın Eli” Divanından bazışiirlerini önce yeni Türkçeye çevirdik vedaha sonra isim ç
... Show MoreAbstract
The aim of the research is to measure the effect of changing the exchange rate on bank loans, and in order to achieve this goal, the (official exchange rate) was chosen as an independent variable and its effect was studied on the dependent variable, which is bank credit. Commercial Gulf, Baghdad, A Shore International for Investment (and the financial indicators (growth rate of loans) and the statistical program (Eviews 12) were used to measure the impact of the exchange rate change on the bank credit of banks, the research sample for the period 2012-2022, and the research reached a group Among the conclusions, the most important of which is that the
... Show MoreThis paper try to shed light on one of interpretations of the prosody of Ibn Barry “Al-duraru l-lawāmi῾ fi maqra᾽i l-ImāmiNāfi῾” a famous prosody that students still study and spend time in memorize and understand it until this day. This interpretation is considered one of the simplest and appropriate to the nature of teaching in the early stages of education for students of Arabic in general. Also, we try very hard to extract the commons characteristics of this and other interpretation of the text we have, then effort a large text as an example of what we are going to say in conclusions.