In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
This study is an objective literary study of the poems of Abu Dhu'ayb Al-Hudhali and Su'da Bint Al-Shamrdal. It aims to shed light on the philosophy of death in the poems, and the way this philosophy is treated by both poets. Thus, the main prominent poetic images have been addressed and the outstanding ones have been singled out. The study further investigates the intertextuality with other poetic verses and Quranic verses and reviews the deviation in their semantic, syntactic, and phonetic types. The study adopts the historical approach to examine the occasion of the poems by referring to several historical sources that indicate the seniority. It also adopts the and descriptive-analytical approach represented by the use of content anal
... Show MoreThe flow in a manifolds considered as an advanced problem in hydraulic engineering applications. The objectives of this study are to determine; the uniformity qn/q1 (ratio of the discharge at last outlet, qn to the discharge at first outlet, q1) and total head losses of the flow along straight and rectangular loop manifolds with different flow conditions. The straight pipes were with 18 m and 19 m long and with of 25.4 mm (1.0 in) in diameter each. While, the rectangular close loop configuration was with length of 19 m and with diameter of 25.4 mm (1.0 in) also. Constant head in the supply tank was used and the head is 2.10 m. It is found that outlets spacing and manifold configuration are the main factors aff
... Show MoreDay after day, Morsek literature 879-1018/1492-1609proves the completion of all literary branches starting from poetry with its different purposes to include prose with its various subjects. In 2016, a complete text of ‘the literature of Morsek journey
Evaluation of “Holy Quran & Islamic Education” Curriculum for Second Intermediate Stage from Perspectives of Teachers & Supervisors of material A Field Study conducted in the Directorates-General of Education in Baghdad Governorate. It goes without saying that educational curricula for students of all stages of schooling are in bad need of reviewing, evaluation and revision. The Islamic education curriculum is no exception, since it is a basic subject that plays a role in developing the individual’s moral and conscientious aspects, promotes his/her inner discipline and helps establish coherence with the values system of the community to which he/she belongs.
Based on the foregoing, the evaluation process of
... Show MoreDay after day, Morsek literature 879-1018/1492-1609proves the completion of all literary branches starting from poetry with its different purposes to include prose with its various subjects. In 2016, a complete text of ‘the literature of Morsek journeys
The physical, mechanical, electrical and thermal properties containing (Viscosity, curing, adhesion force, Tensile strength, Lap shear strength, Resistively, Electrical conductivity and flammability) of adhesive material that prepared from Nitrocellulose reinforced with graphite particles and aluminum streat. A comparison is made between the properties of adhesive material with varying percentage of graphite powder (0%, 25%, 30%, 35%, 40%) to find out the effect of reinforcement on the adhesive material. The ability of property an electrical was studied through the measurement of conductivity a function of temperature varying. The results of comparison have clearly shown that the increasing of conten
... Show MoreMethods of teaching plays an important vole in the educational process
because is the link between the teacher and the learner. The process of
teaching doesut fulfill the desirable results unless the methods of guiding and
teaching are provided and through a qualified educationalist capable of
communicating the syllabus to the students in an easy and clear way. In spite
of the diversity of the methods of teaching ,there is no one way suitable for all
the educational purposes , all the sciences ,all the subjects ,all the levels of
growth ,levels of teaching, maturity and intelligences ,all teachers and
educationalists and all the circum stances surrounding the teaching processes
.The teacher is the one who choos
The contemporary development applications on scientific areas of acyclic and cyclic Schiff bases and their complexes.
Deep learning (DL) plays a significant role in several tasks, especially classification and prediction. Classification tasks can be efficiently achieved via convolutional neural networks (CNN) with a huge dataset, while recurrent neural networks (RNN) can perform prediction tasks due to their ability to remember time series data. In this paper, three models have been proposed to certify the evaluation track for classification and prediction tasks associated with four datasets (two for each task). These models are CNN and RNN, which include two models (Long Short Term Memory (LSTM)) and GRU (Gated Recurrent Unit). Each model is employed to work consequently over the two mentioned tasks to draw a road map of deep learning mod
... Show More