Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Qualitative and Quantitative Determination of Dapagliflozin Propanediol Monohydrate and Its Related Substances and Degradation Products Using LC-MS and Preparative Chromatography Methods
...Show More Authors

Dapagliflozin is a novel sodium-glucose cotransporter type 2 inhibitor. This work aims to develop a new
validated sensitive RP-HPLC coupled with a mass detector method for the determination of dapagliflozin, its
alpha isomer, and starting material in the presence of dapagliflozin major degradation products and an internal
standard (empagliflozin). The separation was achieved on BDS Hypersil column (length of 250mm, internal
diameter of 4.6 mm and 5-μm particle size) at a temperature of 35℃. Water and acetonitrile were used as
mobile phase A and B by gradient mode at a flow rate of 1 mL/min. A wavelength of 224nm was selected to
perform detection using a photo diode array detector. The method met the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Engineering
Experimental and numerical evaluation of friction stirs welding of AA 2024-W aluminum alloy
...Show More Authors

Friction Stir Welding (FSW) is one of the most effective solid states joining process and has numerous potential applications in many industries. A FSW numerical tool, based on ANSYS F.E software, has been developed. The amount of the heat gone to the tool dictates the life of the tool and the capability of the tool to produce a good processed zone. Hence, understanding the heat transfer aspect of the friction stir welding is extremely important for improving the process. Many research works were carried out to simulate the friction stir welding using various softwares to determine the temperature distribution for a given set of welding conditions. The objective of this research is to develop a finite element sim

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
A Note on the Hierarchical Model and Power Prior Distribution in Bayesian Quantile Regression
...Show More Authors

  In this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the  and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayes Estimators for the Parameter of the Inverted Exponential Distribution Under different Double informative priors
...Show More Authors

In this paper, we present a comparison of double informative priors which are assumed for the parameter of inverted exponential distribution.To estimate the parameter of inverted exponential distribution by using Bayes estimation ,will be  used two different kind of information in the Bayes estimation; two different priors have been selected for the parameter of inverted exponential distribution. Also assumed Chi-squared - Gamma distribution, Chi-squared - Erlang distribution, and- Gamma- Erlang distribution as double priors. The results are the derivations of these estimators under the squared error loss function with three different double priors.

Additionally Maximum likelihood estimation method

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The most important and important rule in the Quranic perspective "An applied study"
...Show More Authors

Abstract

    All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 28 2024
Journal Name
Qualitative Research In Education
His job role is in theatrical sports performance in the Iraqi Ministry of Youth and Sports
...Show More Authors

The research aimed to identify the level of job security, the level of sports institutional performance, and the relationship, contribution and impact of job security to sports institutional performance from the point of view of workers in the Iraqi Ministry of Youth and Sports. The descriptive approach was adopted in the manner of correlational relationships on a sample of (400) individuals who were randomly selected by (33.333%) of the employees working in the institutions at the headquarters of the Ministry of Youth and Sports, amounting to a total of (2293) individuals for the sports season (2022-2023), and they are naturally distributed among (13) main institutions in the formations of the headquarters of this ministry, and after adopt

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Development of an Eco-Friendly Method for Iron Extraction and Determination in Pharmaceuticals Using Ciprofloxacin Drug as Chelating agent
...Show More Authors

A method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results hav

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 30 2012
Journal Name
Journal Of Planner And Development
Urban and Architectural continuity to Arab and Islamic heritage
...Show More Authors

This study try to discovering continuity in heritage, from its engaged with emotional side, the core of study is Islamic architectural, these architectural result still estate with time, due to role of it with Islam law, importance of continuity from finding real things of essential architects result The research reaching to concept of thoughtstaying, for Islamic heritage, as basic factor in continuity process by it is architecture. The mostly searches seeing imitation of figures as recently events, or as final result to stage conditions state, but we must remember the Islamic thinking as base stone to architecture results

.

View Publication