Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
"Khurasan statehood" : new centralization of ISIS and limits of incursion and development
...Show More Authors

Abstract This study aims to discover the ways that adopted by extremism to expand to new geographical areas, in order to spread out its ideology, which led to create new geo-strategic zone, aims to recognize ISIS’s strategy to move towards new geographic locations and the motivations behind these transformations, the study also analyses all aspects of this strategy, the group’s relationship with other terrorist groups in these areas and limits of the competition between them. The study also highlights the factors that have led ISIS to move to new geographical areas and its techniques to control them.

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
International and regional alliances polarization.. Case study IRAQ
...Show More Authors

Abstract Iraq has an important place in the regional and international balance, and the competition among countries has increased in rapprochement with Iraq, not only for its geography or its privileged location, but because it has many other components that make regional and international countries want to strengthen their relations with it (Regional and international powers). In addition to that, Iraq has become increasingly important for these international and regional powers after its victory over the terrorist organization (ISIS), which proved an important fact that Iraq represents the most important pillars in the international balance.

View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Nov 25 2025
Journal Name
Inorganic Chemistry Communications
Synthesis, spectroscopic and single-crystal analysis, and DFT studies of N₂O₂ diamine coordination complexes: solvent-driven geometry switching and NLO properties
...Show More Authors

The design of coordination compounds with solvent-responsive optical properties remains a central challenge in molecular photonics. Here, we describe the synthesis and full characterisation of a symmetrical tetradentate diamine ligand, 3,3′-((1,2-phenylenebis(azanediyl))- bis(methanylylidene))bis(pentane-2,4-dione) (H₂L), and its neutral square-planar complexes [M(L)] (M(II) = Co, Ni, Cu). The Cu(II) complex crystallised as [Cu(L)]⋅0.5 (pyrazine), adopting a nearly square-planar geometry (τ₄ = 0.06) in the solid state, as confirmed by single-crystal X-ray diffraction. In DMSO solution, UV–Vis spectra revealed reversible axial coordination of two solvent molecules, driving a transformation to a distorted octahedral geometry. Struc

... Show More
Scopus
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Study of the Singlet and the Triplet States of Two ElectronSystems in the First Excited State
...Show More Authors

A study of the singlet and triplet states of two electron systems in the first excited state was performed using a simple quantum mechanical model, which assigns the 1s,and 2s orbital with two different variational parameters. Our results agree with a high level calculation used by Snow and Bills.

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
Density distributions, form factors and reaction cross sections for exotic 11Be and 15C nuclei
...Show More Authors

The ground state proton, neutron and matter densities of exotic 11Be and 15C nuclei are studied by means of the TFSM and BCM. In TFSM, the calculations are based on using different model spaces for the core and the valence (halo) neutron. Besides single particle harmonic oscillator wave functions are employed with two different size parameters  Bc and Bv.  In BCM, the halo nucleus is considered as a composite projectile consisting of core and valence clusters bounded in a state of relative motion. The internal densities of the clusters are described by single particle Gaussian wave functions.

 Elastic electron scattering proton f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Clinical Dentistry Preview Publication Details
The effect of surgical approaches on the stability and marginal bone loss of early loaded slactive implants with screw retention mean: Comparative clinical and radiological prospective study
...Show More Authors

Purpose: This study aimed to compare the stability and marginal bone loss of implants inserted with flapped and flapless approaches 8 weeks after surgery and 3 months after loading. Material and Methods: Thirty SLActive implants were inserted in 11 patients and early loaded with final restoration 8 weeks after healing period. The stability values determined by Osstell and the marginal bone loss measured by CBCT at the initial time (1st) and 8 weeks of the healing period (2nd) and 3 months after loading (3rd). Results: The overall survival rate was 100%. A significant increase in the 3rd implant stability value in the age of ˂ 40. A significant decrease in the 2nd implant stability value in both gender and traumatic zone with a flapless app

... Show More
View Publication Preview PDF
Scopus
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
(Effect of the Critical Sussecc Factors in the Sustainable Competitive advantage ) "Descriptive analytical studay in Al Mu'tasim General Contracting Company.
...Show More Authors

      The  objective   of this  research is to analyze the relationship between the  Factors  of critical success and sustainable competitive advantage, and I have tested Search Company Mu'tasim General Contracting, through applied on a sample of (90) manager, engineer and project manager, spread over sections and the company's projects surveyed. has been selected sector construction industry as one of the sectors vital and important that play a major role in the advancement of Iraq's infrastructure under the current circumstances, which epresent a set of Projects are Mu'tasim General Contracting construction  imple

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
مشكلات تدريسيي ومحاضري المواد التربوية والنفسية والاجتماعية في الكليات الاختصاص في جامعة بغداد للعام الدراسي 2013/ 2014 من وجهة نظرهم وطلبتهم
...Show More Authors

    Sought researcher to try to detect the type and size of the problems detected in or discovered or exposed or trying to find solutions to them as teachers and lecturers who are studying the educational, psychological and social articles in college studying these materials, whether the jurisdiction or extra materials, and clarified language definitions and terminology for search terms, indicating the importance of research into the problem of these either for teachers or for their students, and prepared a questionnaire organization questions open to get a clear responses and the Organization of the kind of problems faced by the lecturers and their students who are dealing with the educational, ps

... Show More
View Publication Preview PDF