In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The reinforcing effect of emphasizers can hardly be denied, hence their importance , hence the justification for writing this paper. As a particular type of adverbials , emphasizers form part of a major syntactic class. This study, thus, introduces the topic by first discussing a grammatical category characterized by being mobile and optional. The paper duly shows the scaling effect of emphasizers, their kinds and the transformational selectional rules that are operative in moving them to the right or left of the VP. It also handles their syntactic role as modifiers, their syntactic features,their occurrence or non- occurrence with negation and imperative and the position they occupy in the sentence. The paper also dwells on the agr
... Show MoreIn this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this
... Show MoreHonorifics are linguistic expressions which maintain social as well as religious respect to other people. They are linguistic techniques which express politeness to other interlocutors. Semantically speaking, honorifics are of two types: al-Laqab (title) and al-Kuniya (teknonyms) following a specific word order. They form part of the Arab recognitions and are mold into their social and communicative competence.
The study focuses upon religious and regional honorifics which convey deference and respect. It assumes that religious and cultural recognitions play vital roles in formulating and embedding the sense of honorifics. It is hypothesized that Arab people express respect to religious personalitie
... Show MoreSuppose R has been an identity-preserving commutative ring, and suppose V has been a legitimate submodule of R-module W. A submodule V has been J-Prime Occasionally as well as occasionally based on what’s needed, it has been acceptable: x ∈ V + J(W) according to some of that r ∈ R, x ∈ W and J(W) an interpretation of the Jacobson radical of W, which x ∈ V or r ∈ [V: W] = {s ∈ R; sW ⊆ V}. To that end, we investigate the notion of J-Prime submodules and characterize some of the attributes of has been classification of submodules.
This paper presents the concepts of prepaths, paths, and cycles in α-topological spaces and studies them in orderable spaces. Also, many relationships are proved with their equivalences using some properties in topological spaces like compactness and locally connectedness.
The subject of the tagged research (becoming and integration of the film in postmodern cinema) is summarized by studying the transformations and complementarity of the film in light of the emergence of the concern of postmodernism. Then the need for it, as well as the objectives of the research and clarify its limits, as well as its importance. Then the transition to the theoretical framework, which included two sections, the first topic was entitled: Postmodern Cinema Formation and Completion, while the second topic was entitled: Paradox in Postmodern Film.
After completing the theoretical aspect, the research concluded with a number of theoretical framework indicators that were adopted as a tool for analyzing the sample, then th
... Show MoreMany of the signs that the global energy system indicate the start of a period of transition from total dependence on fossil energy sources, especially oil, into a new era in which alternative energy sources play an important role in meeting the growing needs of energy demand, so sought many of the developed countries through research the studies carried out to try to bring renewable energy sources and non-renewable (shale oil, oil sands, solar energy, wind energy .... etc) replace traditional fossil energy sources (oil, gas, coal) and despite the recent availability dramatically and spread throughout the the world, but they are going to dry up in the foreseeable future. So many countries, especially the developed sought to find
... Show MoreThe reaction of(2-oxo-2H-chromen-3-Carbonyl chloride)(k1) with hydrazine in boiling ethanol gives the hydrazide(K2).When compound (k2) reacts with various aromatic aldehydes ,the corres ponding Schiff bases(k3–k4) achieve new series of thiazotidines (k5–k6) and azetidinones (k7–k8) obtained from the reactions of appropriate Schiff bases with mercapto acetic acid and chloro acetyl chloride respectively. All the compounds are characterized by FT-IR,1H-NMR and GC-Ms.
We define and study new ideas of fibrewise topological space namely fibrewise multi-topological space . We also submit the relevance of fibrewise closed and open topological space . Also fibrewise multi-locally sliceable and fibrewise multi-locally section able multi-topological space . Furthermore, we propose and prove a number of statements about these ideas. On the other hand, extend separation axioms of ordinary topology into fibrewise setting. The separation axioms are said to be fibrewise multi-T0. spaces, fibrewise multi-T1spaces, fibrewise multi-R0 spaces, fibrewise multi-Hausdorff spaces, fibrewise multi-functionally Hausdorff spaces, fibrewise multi-regular spaces, fibrewise multi-completely regular spaces, fibrewise multi-normal
... Show More