In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreHighly-fluorescent Carbon Quantum Dots (CQDs) are synthesized in simple step by hydrothermal carbonization method of natural precursor such as orange juice as a carbon source. Hydrothermal method for synthesized CQDs requires simple and inexpensive equipment and raw materials, thus this method are now common synthesis method. The prepared CQDs have ultrafine size up to few nanometers and several features such as high solubility in water, low toxicity, high biocompatibility, photo-bleaching resistant, Chemical inertness and ease of functionalization which qualifies it for use in many applications such as bio-imaging, photo-labeling and photo-catalysis.
This research demonstrates the
... Show MoreAmidst the changes resulting from the subject matter of expression in art. The necessity of searching for the expressive features of thought that leaves different imprints with aesthetic features and values which called for re-modifying the expressive vision of contemporary drawings. Therefore, this research has been concerned with the study of (abstract expressive features in the drawings of (Serwan Baran) and (Eric Barto) - a comparative study), and the research includes four chapters. The first chapter is devoted to explaining the research problem, its importance, need, purpose, and limits, then determining the most important terms mentioned in it. Where the research problem dealt with the subject of abstract expressive feature
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreIn the current study, remote sensing techniques and geographic information systems were used to detect changes in land use / land cover (LULC) in the city of Al Hillah, central Iraq for the period from 1990 - 2022. Landsat 5 TM and Landsat 8 OLI visualizations, correction and georeferencing of satellite visuals were used. And then make the necessary classifications to show the changes in LULC in the city of Al Hillah. Through the study, the results showed that there is a clear expansion in the urban area from 20.5 km2 in 1990 to about 57 km2 in 2022. On the other hand, the results showed that there is a slight increase in agricultural areas and water. While the arid (empty) area decreased from 168.7 km 2 to 122 km 2 in 2022. Long-term ur
... Show MoreCloud point extraction is a simple, safe, and environmentally friendly technique for preparing many different kinds of samples. In this review, we discussed the CPE method and how to apply it to our environmental sample data. We also spoke about the benefits, problems, and likely developments in CPE. This process received a great deal of attention during preconcentration and extraction. It was used as a disconnection and follow-up improvement system before the natural mixtures (nutrients, polybrominated biphenyl ethers, pesticides, polycyclic sweet-smelling hydrocarbons, polychlorinated compounds, and fragrant amines) and inorganic mixtures were examined and many metals like (silver, lead, cadmium, mercury, and so on). We also find
... Show More
Abstract
Indeed, being busy with the understanding of religion is the best sort of worship that the almighty God has given each period of time a number of scholars and wise men. They receive what has been passed down to them from their great ancestors, and those who are willing to learn will learn, their students preserve their knowledge through teaching and writing. Thus, the scholars were pioneers in this field due to the value and importance of their knowledge. They have strived in learning, explaining, and writing new subjects.
One of those scholars is sheikh (Abdulrahman Al-Penjweni) who passed away 1319 AH in one of the villages of the city of Sulaimani in Iraq. He was one of the wisest scholars, a br
... Show MoreA novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in
... Show MoreThis study is about the role of the Internet in spreading rumors, especially through social networking sites "Facebook" model as the effectiveness of social networks lies in the speed of transmission of events; these two characteristics are important to the public, making the Internet a strong contender for television and its relationship with the public. That's why we find that the Internet today has become a fertile environment for the growth and spread of rumors. The more limited the platforms and places of publication, the greater the responsibility in the search for the original source in spreading this or that rumor, as the Internet is considered an easy means in the production, spreading and re-spreading of
... Show More