In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Abstract
The Research "Surah At-Talaq between Commentators and Jurists" is summarized in the objectives of the Surah, clarifying the meanings of the verses of the rulings contained therein by mentioning the statements of the commentators, with mentioning the most acceptable of those meanings when a difference arises, explanation of the provisions of the Surah, with a statement of sayings of the four religious schools of Islamic jurisprudence, in summary, due to the narrowness of the place, and the most acceptable of them.
The research addresses (9) topics, which are: the objectives of Surah At-Talaq, prohibition of divorce during menstruation, testifying retract and divorce, irrevocably divo
... Show MoreThis thesis study (pen weight and diversity of Arabic calligraphy), including the Arabic script went through multiple bodies, it came through the natural evolution of societies, and helped in the renovation and development of calligraphy after they gained a clear identity as a result of development that has occurred in the materials and writing instruments, especially industry pen that led to the diversity of Arabic calligraphy, and through the exploratory research and modeling study, which was obtained that the researcher could pose a problem discussed in the first chapter of his study follows by asking: is the pen is the weight of the role in the diversity of Arabic calligrap
... Show MoreAbstract:
This research aims to identify the type of cultural values prevailing in the Ramadi General Hospital, and Baghdad, educational, and whether the organization's culture values play a role in improving the quality of nursing care service in hospitals, and how different cultural values of the nurses between Ramadi Teaching Hospital and General education Baghdad Hospital because of the nature social and cultural Different each region, including the research sample of all nurses working in Baghdad Teaching Hospital, and Ramadi educational-General, adopted Find descriptive analytical approach adopted scale developer (Hofstede, 1991) and (Furrer et al, 2000) And pres
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
These researches have shown the magnitude of the influence that culture exerts on all human extensions and spaces. Rather, the conviction of many thinkers, researchers and specialists in the comprehensiveness of this influence is such that it is used as a starting point and perspective to explain the various aspects, manifestations, problems and practices. According to these perceptions, a man carries a cultural mind that is slowly formed throughout the young years of a man’s life and is completed upon reaching the age of maturity. Therefore, it has become evident in the behavioral, social and human sciences to acknowledge the multiplicity of human thought patterns as a natural result of the different cultures of peoples and societies.
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon our Master Muhammad and upon all his family and companions:
And then: What most concerns rational people and reformers in the modern era is the moral deviation and delinquency that dominates childhood, due to family disintegration and the lack of discipline of most societies according to the religious and moral motives called for by the heavenly messages, especially Islam, which is the final message and guarantees the reform of people in life. Every time and place.
Islam has drawn attention to this issue (childhood) and made it the focus of its consideration, considering that the child is the nucleus of society and the preparation for the future, so it ordered that
The current study included the collection of 175 samples of blood (Urea-blood) of patients with rheumatoid arthritis from Al–Al-Kindy Teaching Hospital, Baghdad Teaching Hospital and Al-Imamian Al-Kadhimyain Medical City in Baghdad from both sexes with different ages at the period between 1/10/2016-1/2/2017. Bacterial growth results showed that 80% of urea for bacterial transplantation were positive results, while the number of samples showing no bacterial growth was 20%. The bacterial isolation evaluate for morphological testes and biochemical microscopy, as well as identification by Api system. The highest frequency of inflectional bacteria was E. coli (41.97%), followed by E. cloacae (21.25%), P. aeruginosa (12.5%), Salmonella (10%), K
... Show More