In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Optimization is essentially the art, science and mathematics of choosing the best among a given set of finite or infinite alternatives. Though currently optimization is an interdisciplinary subject cutting through the boundaries of mathematics, economics, engineering, natural sciences, and many other fields of human Endeavour it had its root in antiquity. In modern day language the problem mathematically is as follows - Among all closed curves of a given length find the one that closes maximum area. This is called the Isoperimetric problem. This problem is now mentioned in a regular fashion in any course in the Calculus of Variations. However, most problems of antiquity came from geometry and since there were no general methods to solve suc
... Show MoreBackground: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as K
... Show MoreAbstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the
Salmonellosis in poultry is one of the most significant bacterial infections causing mortality, reduced production, and serious economic losses. This study aimed to study the molecular diversity among Salmonella isolates and investigate the epidemiological spread of these bacteria in broiler and layer chicken flocks in five different farms in Karbala, Iraq, using random amplified polymorphic DNA (RAPD) polymerase chain reaction (PCR). In total, 217 cloac a swabs were collected from the farms, out of which 129 and 88 swabs were taken from broiler and layer chickens. The samples were screened by PCR for S. enterica subsp. enterica using primers specific for the invA gene. Afterward, RAPD-PCR with uniplex or multiplex octamer primers was appli
... Show MoreThe creative production of the philosophy of beauty in artistic works constitutes a step towards development and progress by meeting the growing and changing needs of humanity according to various factors, including those related to the human situation and others related to technical outputs, as well as the multiplicity of the field for the emergence of new artistic currents and movements concerned with graphic production and communication and communication processes that It is associated with imagination and freedom from social and cultural constraints, in which the design production seeks to link more realistic intellectual contents with the achievements of the creative artwork as a communication system to involve the recipient (the vi
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the company's relian
... Show Morethis research has discussed some social phenomena in lslamic society through the book of the unique contract of lbn abed rabbi al-andalusi. ln the beginning , he gave an account of his life.