In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte
... Show MoreA simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected opti
... Show MoreThe Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is&
... Show Moreمشكلة البحث:
يبقى الفن ولا زال في جميع حالات التعاقب البشري ومراحل التطور الانساني الاكثر انطلاقة وتميزاً في التعبير عن واقع الانسان وعن مشاعره وانفعالاته وافكاره ذات الصلة بتأثيرات البيئة المحيطة به.
والفن ولاسيما (الرسم) يمثل وسيلة من وسائل التعبير الفني بل يكاد يكون الرسم وسيلة الانسان الاولى التي عبر فيها بخطوط مرئية عن مجالات حياته وعلاقته بالبيئة التي عاش فيها، ويقينا
... Show MoreEvolutionary·co.nipimit'iQo is a· c'!a s of glbbal ·searb techniq
based on the lei.lffi:ing process ,of g po_pl)'latiog-·of pote.n:tiaf solutions to
a ven probl_e-ID'. thahas .been succe_ssfull'y applied 19 v ety of
prQblern, lll thls paper a riew approach to. design lie_ ural ne'twQj:ks
based oh ev.ohltipnary -computa.tio.rt i·s pre.Seri-L _A tine-f.!£ clurP.mosome
'repr:esentati:on or the etwor}< i_s. u_secl: 'Q.y genetiC gperntb_l:s, whicQ
allow th¢ voJution of.the chitecture and' weight-s Â
... Show MoreThis study aimed to stand on genetic effects important of cabergoline drug. This toxic effect was evaluated for three different doses (0.05, 0.1, 0.5 mg/ml) in comparison with control (PBS/ phosphate buffer saline) both in vivo and in vitro. In vivo study involved the cytogenetic evaluation of cabergoline in mice by examination of mitotic index percentage (MI), micronucleus formation (MN) and chromosomal aberrations. Result indicated that all the tested doses cause significant reduction in MI percentage, while significant rise was seen with both MN formation and all studied chromosomal aberrations. While in vitro study involved measuring the effect of cabergoline on normal cell line (REF/ Rat embryonic
... Show MoreIn spite of the high rate of morbidity and mortality heart failure (HF) is common, and none of the medications are now entirely available for HF treatment. In addition to many environmental influences and clinical diseases, genetic factors may also contribute to the progression and development of HF. In the current study, samples of blood were collected from 150 heart failure patients and 130 healthy controls. We evaluated the association of four single nucleotide polymorphisms (snps) of Toll-like receptors (TLR6 and TLR5) with (HF) susceptibility in the Iraqi population. In this work, (SNP) called Toll-like receptor 5 (rs5744168, rs2072493) and Toll-like receptor 6 (rs1039559, rs5743810) were employed. (PCR-RFLP) for snps
... Show More