In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Abstract
This study aimed to survey fungi associated with the product Indomie and Chips being the trades Iargely by a very important segment of society who are the children, beside consumed by adults, but less so, as the survey results to accompany some fungui samples sterile showed proportions presence included various fungi like. Aspergillus flavus, Aspergillus niger, Penicillium Spp., Fusarium graminearum, F.moniliforme, Alternaria alternate and Rhizopus Spp., and other fungi sterile are not diagnosed. The results showed large dominion fungi A. niger by presence sterile samples of both producers, followed by infection in Fusarium Spp., Penicillium Spp., and A. alternata by infection percentage 55, 20 and 17% respectively for the pr
This paper is focused on studying the effect of cutting parameters (spindle speed, feed and depth of cut) on the response (temperature and tool life) during turning process. The inserts used in this study are carbide inserts coated with TiAlN (Titanum, Aluminium and Nitride) for machining a shaft of stainless steel 316L. Finite difference method was used to find the temperature distribution. The experimental results were done using infrared camera while the simulation process was performed using Matlab software package. The results showed that the maximum difference between the experimental and simulation results was equal to 19.3 , so, a good agreement between the experimental and simulation results was achieved. Tool life w
... Show MoreMulti-carrier direct sequence code division multiple access (MC-DS-CDMA) has emerged recently as a promising candidate for the next generation broadband mobile networks. Multipath fading channels have a severe effect on the performance of wireless communication systems even those systems that exhibit efficient bandwidth, like orthogonal frequency division multiplexing (OFDM) and MC-DS-CDMA; there is always a need for developments in the realisation of these systems as well as efficient channel estimation and equalisation methods to enable these systems to reach their maximum performance. A novel MC-DS-CDMA transceiver based on the Radon-based OFDM, which was recently proposed as a new technique in the realisation of OFDM systems, will be us
... Show MoreThree-dimensional nonlinear thermal numerical simulations are conducted for the friction stir welding (FSW) of AA 7020-T53. Three welding cases with tool (rotational and travel) speeds of 900rpm-40mm/min, 1400rpm-16mm/min and 1400rpm-40mm/in are analyzed. The objective is to study the variation of transient temperature in a friction stir welded plate of 5mm workpiece thickness. Based on the experimental records of transient temperature at several specific locations during the friction stir welding process for the AA 7020-T53, thermal numerical simulation is developed. The numerical results show that the temperature field in the FSW process is symmetrically distributed with respect to the welding line, increasing travel speed decreasing tran
... Show MoreS Khalifa E, N Adil A, S Husam Ali, H Nibras A…, 2009
During the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho
... Show MoreThe Christian religion came in love and co-existence with all human beings, united in the minds of its people, including the great creation to form a strong unit of high ethics that contributes to the unity among the members of society and coexistence in security, peace and love of harmony.
Throughout this paper, T is a ring with identity and F is a unitary left module over T. This paper study the relation between semihollow-lifting modules and semiprojective covers. proposition 5 shows that If T is semihollow-lifting, then every semilocal T-module has semiprojective cover. Also, give a condition under which a quotient of a semihollow-lifting module having a semiprojective cover. proposition 2 shows that if K is a projective module. K is semihollow-lifting if and only if For every submodule A of K with K/( A) is hollow, then K/( A) has a semiprojective cover.
KE Sharquie, AA Noaimi, HA Salman, NA Hindy, Iraqi Postgraduate Medical Journal, 2009 - Cited by 1