In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
This study uses load factor and loss factor to determine the power losses of the electrical feeders. An approach is presented to calculate the power losses in the distribution system. The feeder’s technical data and daily operation recorded data are used to calculate and analyze power losses.
This paper presents more realistic method for calculating the power losses based on load and loss factors instead of the traditional methods of calculating the power losses that uses the RMS value of the load current which not consider the load varying with respect to the time. Eight 11kV feeders are taken as a case study for our work to calculate load factor, loss factor and power losses. Four of them (F40, F42, F43 and F
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show More|
مجلة العلوم الاقتصادية والإدارية المجلد 18 العدد 69 الصفحات 318- 332 |
DBN Rashid, Talent Development & Excellence, 2020
In this present work, [4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)bis(2-methoxyphenl)(A1),4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)diphenol(A2),1,1`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene) dinaphthalen-2-ol (A3)]C.S was prepared in 3.5% NaCl. Corrosion prevention at (293-323) K has been studied by using electrochemical measurements. It shows that the utilized inhibitors are of mixed type based on the polarization curves. The results indicated that the inhibition efficiency changes were used with a change according to the functional groups on the benzene ring and through the electrochemical technique. Temperature increases with corrosion current
... Show MoreIn the present study NiPcTs, CdS thin films, and Blends of NiPcTs:CdS were prepared with 1:2 content mixing ratio of NiPcTs to CdS solutions. Cadmium chloride and thiourea were used as the essential materials for deposition CdS thin films while using organic powder of NiPcTs to deposit NiPcTs nanostructure films. The spin-coating technique was employed to fabricate the NiPcTs , CdS films and NiPcTs-CdS blend. Structural properties of films have been investigated via X-Ray diffraction(XRD),and show that thin films of NiPcTs, and CdS have monoclinic and polycrystalline hexagonal structure respectively while the blend has two polycrystalline structure with cubic and hexagonal phases. Atomic force microscope (AFM) confirmed that the surf
... Show MoreIn this research two series of the new derivatives of Trimethoprim and paracetamol drugs have been prepared which known as a high medicinal effectiveness. Series (A) is including the interaction of diazonium salt of trimethoprim and coupling with some substituted phenol compounds (2-amino phenol, 3-ethyl phenol, 1-naphthol, 2-nitro phenol, Salbutamol). Series (B) is including the interaction coupling alkali solution of paracetamol with diazonium salt of some substituted aniline compounds (Benzedine, 2, 3-di chloro aniline, Trimethoprim, Anilinium chloride, 2-nitro- 4-chloro aniline).Chemical structures of all synthesized compounds were confirmed by UV-visible and FTIR spectroscopy.
The results of the historical review of social and political realities in general show that the practical and procedural applications of social engineering as a particular activity primarily of the social and political characteristics of man and society emerged in modern Western societies before appearing in other societies, These results also show that the emergence of these practical reasons and their applications in the West has also seen the emergence of modern theoretical foundations there, which seems to be the usual and usual context everywhere and in most or not all areas of life. Since the social and political dimensions are intertwined in human life and are in full, comprehensive and lasting harmony, interest in this geometry h
... Show More« The emergence of satellite channels has led to fundamental changes in the supposed role of television, making it a center of culture and an important tributary to social upbringing and influencing the attitudes and values of individuals and in making public opinion regarding various issues, some television programs target ordinary people at home by virtue of the nature of their subjects, where there is a large audience of viewers, who consume and absorb what is offered to them from the cultural production of those satellite channels that play with the aspirations of groups of society to find metaphysical or magic solutions to their social problems or psychological delusions. The media, through its various messages, contributes to brin
... Show More