Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of performance of the inspection teams in the appraisal of health situation in Dhi-Qar case research in the Health Department of Dhi-Qar
...Show More Authors

Abstract

Research aims : The aim of the research is to evaluate the reality of the inspection teams' work in the health institutions belonging to Dhi-Qar health office .

Purpose: This research seeks to present a point of view based on knowing the extent of health service quality in Dhi-Qar governorate and discover the role of the inspection teams in enhancing the health service.

Design / Methodology/ Approach: The experimental method has been used and the questionnaire has also been used to collect data in order to develop a reliable and correct measurement model for the research's variables . The research's hypotheses have been tested through using some statistical treat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Mangrove Landscaping As An Adaptation Pattern To Reduce The Impact of Climate Change in Segara Anakan Lagoon, Cilacap Regency Indonesia
...Show More Authors

Mangrove landscaping in the Segara Anakan Lagoon (SAL) is an adaptation pattern of mangrove ecosystems to live and grow in unstable areas. This research aimed to develop a mangrove landscape to mitigate the impacts of ocean waves, currents, and inundation due to climate change. The study was conducted in SAL and Cilacap Coast (CC) using the environmental properties and climate change data. The data obtained were analyzed using mapping and trendline analyses. The results showed that mangrove landscaping in Segara Anakan had four zones with Nypa frutican, Rhizophora styllosa, Aegiceras corniculatum, Rhizophora apiculata, Avicennia marina, Sonneratia alba identified as the best adaptation of mangrove species. Climate change give a high impa

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Risk-Based Inspection Due to Corrosion Consequences for Oil and Gas Flowline: A Review
...Show More Authors

   The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Checking the Accuracy of Selected Formulae for both Clear Water and Live Bed Bridge Scour
...Show More Authors

Due to severe scouring, many bridges failed worldwide. Therefore, the safety of the existing bridge (after contrition) mainly depends on the continuous monitoring of local scour at the substructure. However, the bridge's safety before construction mainly depends on the consideration of local scour estimation at the bridge substructure. Estimating the local scour at the bridge piers is usually done using the available formulae. Almost all the formulae used in estimating local scour at the bridge piers were derived from laboratory data. It is essential to test the performance of proposed local scour formulae using field data. In this study, the performance of selected bridge scours estimation formulae was validated and sta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Different Estimators for the shape Parameter and the Reliability function of Kumaraswamy Distribution
...Show More Authors

In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Isolate and diagnose some bacteria contaminated minced meat and determine the concentrations of powder and extracts plant cinnamon bark inhibitory and minimum lethal bacteria
...Show More Authors

Powder extracts hot water from local ground beef and studied inhibitory effectiveness of powder and extracts to the concentration of the aqueous extract hot Gulf students

View Publication Preview PDF
Publication Date
Sun May 07 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS: DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS
...Show More Authors

The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Anbar Journal Of Agricultural Sciences
EFFECT OF ACIDS AND ORGANIC NUTRIENTS ON CAULIFLOWER GROWTH AND YIELD AND WATER USE EFFICIENCY AND FERTILIZER PRODUCTIVITY OF A MODIFIED NFT HYDROPONICS SYSTEM
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Pressure Control of Electro-Hydraulic Servovalve and Transmission Line Effect
...Show More Authors

The effected of the long transmission line (TL) between the actuator and the hydraulic control valve sometimes essentials. The study is concerned with modeling the TL which carries the oil from the electro-hydraulic servovalve to the actuator. The pressure value inside the TL has been controlled by the electro-hydraulic servovalve as a voltage supplied to the servovalve amplifier. The flow rate through the TL has been simulated by using the lumped π element electrical analogy method for laminar flow. The control voltage supplied to servovalve can be achieved by the direct using of the voltage function generator or indirect C++ program connected to the DAP-view program built in the DAP-card data acqu

... Show More
View Publication Preview PDF