Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Journal Of University Of Babylon For Pure And Applied Sciences
Genetic Detection of IMP-1 Gene and its Relationship with Biofilm Formation in Klebsiella pneumonia
...Show More Authors

Background: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as K

... Show More
View Publication
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Parasitology International
Genetic polymorphism of Baylisascaris procyonis in host infrapopulations and component populations in the Central USA
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Archives Of Razi Institute
RAPD Fingerprinting and Genetic Diversity of Salmonella Spp. Isolated from Broiler and Layer Flocks in Karbala, Iraq
...Show More Authors

Salmonellosis in poultry is one of the most significant bacterial infections causing mortality, reduced production, and serious economic losses. This study aimed to study the molecular diversity among Salmonella isolates and investigate the epidemiological spread of these bacteria in broiler and layer chicken flocks in five different farms in Karbala, Iraq, using random amplified polymorphic DNA (RAPD) polymerase chain reaction (PCR). In total, 217 cloac a swabs were collected from the farms, out of which 129 and 88 swabs were taken from broiler and layer chickens. The samples were screened by PCR for S. enterica subsp. enterica using primers specific for the invA gene. Afterward, RAPD-PCR with uniplex or multiplex octamer primers was appli

... Show More
View Publication Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
External audit data on liabilitySocial organizations for profit
...Show More Authors

Givers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.

This  encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.

In this respect the Audit function comes to che

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 17 2019
Journal Name
Journal Of The College Of Education For Women
The Architectural Heritage of Baghdad in Ibn Al-Faqih Hamadani's Book Baghdad the City of Peace And its impact on Sustainable Development
...Show More Authors

This research shows the importance of Baghdad in the field of urban heritage and was demonstrated in the Ibn al-Fiqh al-Hamdani's book Baghdad the City of Peace in which he focused on many urban aspects and reviewing its historical importance by connecting them with modern events and the role they play in cultural and civilized construction which included: mosques, schools and markets etc. and the service providing institutions and other pillars of the Islamic cities through showing the development back then and its importance as an integral part of the urban and cultural heritage of the Islamic cities in general and Baghdad city in particular. 

In his book Baghdad the City of Peace, Ibn al-Faqih Hamadhaani

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
המאבק הפנימי של מרדכי זאב פיארברג מתוך גיבורו של הסיפור "לאן?" מורה עוזר זינה אייד קסים
...Show More Authors

המחקר הזה עוסק באחד מהסופרים העבריים שנחשבו בעלי־השפעה בתהליך הספרות
העברית החדשה על אף גילו הקצר ועל אף שהוא השאיר עזבון ספרותי מועט , אך עם זה דמותו עולה
לענינו גם מתוך כתביו המעטים כאילו הם טבועים בחותם, הסופר הזה הוא מרדכי זאב פיארברג.
במחקר זה טיפלנו בחייו של המספר הזה בקיצור וגם ביצירותיו באופן כללי, ובסימנים המאפינים
את גיבוריו, ובמיוחד גיבורו של הסיפור "לאן?" שהוא אכן גיבור פיארברגי מובהק והוא נת

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Recognizing Different Foot Deformities Using FSR Sensors by Static Classification of Neural Networks
...Show More Authors

Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Achieving customer satisfaction by booking electronic flight tickets via the Internet of Things technology
...Show More Authors

Abstract:

                The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)

... Show More
View Publication Preview PDF