Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Prevent administrative and financial corruption behaviors by activating the functions of the organizational immunity system
...Show More Authors

The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
An open cloud-based platform for the creation and delivery of smart applications and services
...Show More Authors
Abstract<p>With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Analytical And Bioanalytical Chemistry Research
Mutual Derivatization in the Determination of Dapsone and Thymol Using Cloud Point Extraction Followed by Spectrophotometric Detection
...Show More Authors

A procedure for the mutual derivatization and determination of thymol and Dapsone was developed and validated in this study. Dapsone was used as the derivatizing agent for the determination of thymol, and thymol was used as the derivatizing agent for the determination of Dapsone. An optimization study was performed for the derivatization reaction; i.e., the diazonium coupling reaction. Linear regression calibration plots for thymol and Dapsone in the direct reaction were constructed at 460 nm, within the concentration range of 0.3-7 μg ml-1 for thymol and 0.3-4 μg ml-1 for Dapsone, with limits of detection 0.086 and 0.053 μg ml-1, respectively. Corresponding plots for the cloud point extraction of thymol and Dapsone were constructed

... Show More
Scopus (3)
Scopus
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
The position of Al-Jassas (D. 370 AH) of the verses of "As-Sifat Al-Khbriya"
...Show More Authors

 

This research aims at know the position of Al-Jassas Al- Hanafi (D. 370 AH) of  "As-Sifat Al- Khbriya", through his interpretation: (the provisions of Qur'an), by studying his interpretation of the verses related to this issue.

The most significant results of this study that Al-Jassas did not consider the words that called: "As-Sifat Al- Khbriya" as adjectives to Allah almighty, but he consider them contained an inappropriate meaning to Allah almighty, thus it must be referred to the perfect arbitrator, so he was believe in opinion of interpretation. and interpretations of Al-Jassas for the related of the Qur'an verses relat

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
Conference Proceedings
Assessing the accuracy of 'crowdsourced' data and its integration with official spatial data sets
...Show More Authors

Scopus (20)
Scopus
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Evaluation of routing protocol with multi-mobile sinks in WSNs using QoS and energy consumption parameters
...Show More Authors

An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Tue Jan 23 2018
Journal Name
المجلة الاقتصادية والإدارية
حاكمية الجامعات من خلال استخدام المدخل المتدرج للقرار الاستراتيجي
...Show More Authors

دراسة حاكمية الجامعات وأثرها في القرار الاستراتيجي

Publication Date
Fri Sep 01 2023
Journal Name
Misan Journal Of Academic Studies
مجالس الوعظ والوعاظ عند المسلمين من خلال كتب الحسبة.
...Show More Authors

كانت المجالس وما ا زلت تعقد فػي البيػوت او الػدواويف الرسػمية ينػاقش فيهػا المجتمعػوف امػوره الخاصػػة والعامػػة وقػػد اخػػذت هػػذ المجػػالس عمػػ عاتقهػػا نشػػر عمػو العممػػا والقصائد الشعرية والاخبار السياسية والفكاهية وكاف يحضرها مختمؼ ش ا رئح المجتمع ساعدت هػذ المجػالس عمػ حفػظ التػ ا رث العربػي الاسػلامي مػف مثُػؿ وقػي خمقيػة لكػف بسبب الفػتف المذهبيػة التػي سػادت المجتمػع فػي القػرف الخػامس الهجػري

... Show More