Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Water Footprint and Virtual Water and Their Effect on Food Security in Iraq
...Show More Authors
Abstract<p>The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Determination of Optimal Time-Average Wind Speed Data in the Southern Part of Malaysia
...Show More Authors

Mersing is one of the places that have the potential for wind power development in Malaysia. Researchers often suggest it as an ideal place for generating electricity from wind power. However, before a location is chosen, several factors need to be considered. By analyzing the location ahead of time, resource waste can be avoided and maximum profitability to various parties can be realized. For this study, the focus is to identify the distribution of the wind speed of Mersing and to determine the optimal average of wind speed. This study is critical because the wind speed data for any region has its distribution. It changes daily and by season. Moreover, no determination has been made regarding selecting the average wind speed used for w

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 02 2018
Journal Name
Arab Science Heritage Journal
الجذور الجذور التاريخية لاسم بغداد من خلال المواقع الأثرية القديمة
...Show More Authors

 

        It’s good to study  the historical sites because they determine the reason why Abu Jaafar Al-Mansour choose Baghdad the timeless Capital ,So it’s easy for us to reconnect  the past and the present regarding to the city, and must understand how its important the geographic site selection, which is determined by  ancient rivers, which were the basis on which the city was constructed  in the various roles of historical and this is natural because the

View Publication Preview PDF
Publication Date
Thu Nov 08 2018
Journal Name
Arab Science Heritage Journal
براعة براعة علماء الأندلس في الزراعة من خلال مؤلفاتهم الفلاحية
...Show More Authors

           It was the sayings of Andalusia scholars in agriculture based on experiments and theories that helped a lot in the success and development of agriculture in the Andalusia ,and also The divisions of the soil and out types and forms it helped a lot of to know arable of non-arable land earth and all off the determination of the color of repentance is important often discovered by agricultural scientists and that helped in the cultivation of certain crops in certain land without another land.and though each particular agricultural crops specific soil in which to live and not live in other soil ,

View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
New Spectral Range Generations from Laser-plasma Interaction
...Show More Authors

            High-intensity laser-produced plasma has been extensively investigated in many studies. In this demonstration, a new spectral range was observed in the resulted spectra from the laser-plasma interaction, which opens up new discussions for new light source generation. Moreover, the characterizations of plasma have been improved through the interaction process of laser-plasma. Three types of laser were incorporated in the measurements, continuous-wave CW He-Ne laser, CW diode green laser, pulse Nd: YAG laser. As the plasma system, DC glow discharge plasma under the vacuum chamber was considered in this research. The plasma spectral peaks were evaluated, where they refer to Nitrogen gas. The results indicated that the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Arab Science Heritage Journal
الأحجار والمجوهرات ومدى تأثيرها الطبي من خلال دراسة أبن الأكفاني
...Show More Authors

عرف العرب ، منذ القدم ، الأحجار الكريمة وعنوا بإقتناء أنواعا عديدة منها ، حيث كانت من أهم واردات سكان بلاد وادي الرافدين من السومريين والبابليين ثم الآشوريين ، كما عرفها المصريون القدماء وغيرهم من الشعوب القديمة ، فوجدت في قبورهم ومدافنهم وخزائن كنوزهم، مثل الياقوت الأحمر واللازورد واللؤلؤ . بالإضافة إلى ذلك فقد كان معدني الذهب والفضة من المعادن الوفيرة في هذه البلاد ، ولها الأولوية في صناعة الحلي.

View Publication Preview PDF