In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.
Been studying the opposite effect of mutagenesis to juice plant watercress and compared juice carrots to induce mutations resistant Struptomaysan Palmtafr (NTG) and transactions as diverse as the use of juice before treatment Palmtafr or after using Almtafr or with Almtafr using system mutagenesis Bactra consisting of three isolates G3, G12, G27 are very sensitive to Struptomaysanstudy resulted in a user juice plants had no effect on the neighborhood number of isolates, but its effect on the watercress was clear
Worldwide attention is being focused on nanocrystalline zeolites and they are replacing conventional ones due to their pronounced potential in many fields. In this study, NaY zeolite has been prepared hydrothermally using sol –gel method and modified to the proton type by ion –exchange process. Characterization is made using X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FTIR), Atomic force microscopy (AFM), Brunauer –Emmet- Teller (BET) nitrogen adsorption method, Ammonia Temperature programmed desorption (NH3-TPD) and Scanning electron microscopy( SEM). The effect of aging time, silica to alumina ratio is studied and the results sh
... Show MoreIn this research has been the manufacture and study the properties of the solar cell type retail hybrid manner thermal evaporation emptiness were studying the properties of the cell at room temperature showed measurements stream circuit behavior linear cell manufacturers reached were calculated efficiency tool cell manufacturers, as well as the expense of workers filling the cell
Urban morphological approach (concepts and practices) plays a significant role in forming our cities not only in terms of theoretical perspective but also in how to practice and experience the urban form structures over time. Urban morphology has been focused on studying the processes of formation and transformation of urban form based on its historical development. The main purpose of this study is to explore and describe the existing literature of this approach and thus aiming to summarize the most important studies that put into understanding the city form. In this regard, there were three schools of urban morphological studies, namely: the British, the Italian, and the French School. A reflective comparison between t
... Show MoreThe red tripyrrole pigment known as prodigiosin (PG), which belongs to the prodigiosin family, is an interesting substance that has attracted the attention of scientists due to its versatility. Thanks to its striking red pigment and distinctive chemical characteristics, prodigiosin has caught the attention of researchers seeking new solutions across a variety of disciplines. Serratia marcescens and other bacteria like Hahella chejuensis, Vibrio gazogenes, Pseudoalteromonas rubra, Janthinobacterium lividum, Actinomadura madurae, and Streptomyces coelicolor produce prodigiosin, a red pigment that functions as secondary metabolite. Prodigiosin has shown promising activity as an antibacterial agent in numerous experiments. Prodigiosin is a prom
... Show MoreCilnidipine is a dihydropyridine class of calcium channel blockers, it is classified as a BCS class II drug, characterized by a low oral bioavailability of 13%. Consequently, the utilization of nanoparticle preparation is anticipated to enhance its bioavailability. The objective of the research is to integrate cilnidipine nanoparticles into oral films as a means of enhancing patient adherence. The optimal polymers for producing Cilnidipine films were PVA cold and or HPMC E5 at different concentrations using a casting technique with glycerol as a plasticizer. The Nano suspension-based preparation of Cilnidipine's oral film containing the combination of polymers exhibited a significant enhancement in vitro dissolution, with a percentage excee
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show More