Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (21)
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
(The role of the Security Council in Managing international crises (The Libyan crisis as a model
...Show More Authors

The Security Council has an active role in addressing international crises and dealing with their causes. The Libyan crisis is one of the most important real tests of the Security Council and its role in maintaining international peace and security, as the Council has proven so far an ineffective role in resolving the crisis and dealing withtheir causes, which has prolonged its duration and increased its complexities and dangerous repercussions, perhaps the most prominent of which is the threat of the recently achieved cease-fire and the formation of a new transitional government led by Abdel Hamid al-Dabaiba, the growing significant obstacles facing the political process, foremost of which is the continued presence of foreign forces , m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 17 2019
Journal Name
Journal Of The College Of Education For Women
The Architectural Heritage of Baghdad in Ibn Al-Faqih Hamadani's Book Baghdad the City of Peace And its impact on Sustainable Development
...Show More Authors

This research shows the importance of Baghdad in the field of urban heritage and was demonstrated in the Ibn al-Fiqh al-Hamdani's book Baghdad the City of Peace in which he focused on many urban aspects and reviewing its historical importance by connecting them with modern events and the role they play in cultural and civilized construction which included: mosques, schools and markets etc. and the service providing institutions and other pillars of the Islamic cities through showing the development back then and its importance as an integral part of the urban and cultural heritage of the Islamic cities in general and Baghdad city in particular. 

In his book Baghdad the City of Peace, Ibn al-Faqih Hamadhaani

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Achieving customer satisfaction by booking electronic flight tickets via the Internet of Things technology
...Show More Authors

Abstract:

                The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
המאבק הפנימי של מרדכי זאב פיארברג מתוך גיבורו של הסיפור "לאן?" מורה עוזר זינה אייד קסים
...Show More Authors

המחקר הזה עוסק באחד מהסופרים העבריים שנחשבו בעלי־השפעה בתהליך הספרות
העברית החדשה על אף גילו הקצר ועל אף שהוא השאיר עזבון ספרותי מועט , אך עם זה דמותו עולה
לענינו גם מתוך כתביו המעטים כאילו הם טבועים בחותם, הסופר הזה הוא מרדכי זאב פיארברג.
במחקר זה טיפלנו בחייו של המספר הזה בקיצור וגם ביצירותיו באופן כללי, ובסימנים המאפינים
את גיבוריו, ובמיוחד גיבורו של הסיפור "לאן?" שהוא אכן גיבור פיארברגי מובהק והוא נת

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Recognizing Different Foot Deformities Using FSR Sensors by Static Classification of Neural Networks
...Show More Authors

Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 26 2023
Journal Name
Arab Science Heritage Journal
غسل الحيض من خلال كتاب شرح ابن كمال باشا على أول الهداية ( دراسة وتحقيق )
...Show More Authors

This study deals with the field of acieving the manuscripts of Islamic sciences by the great Imam ibn Kamal Pasha, but the mentioned book requires a great effort to explain what it contains of sciences, and to appear what it has contained

View Publication Preview PDF
Publication Date
Sun Apr 28 2019
Journal Name
Arab Science Heritage Journal
الظواهر الظواهر الاجتماعية في بغداد من خلال كتاب الظرف والظرفاء لابي الطيب الوشاء(ت320هـ)
...Show More Authors

 the study of social phenomena in this direction is, the sign of deviousness to the segments of the circumstance with their conditions and circumstances, then pointed to the uniforms that they were adorned by the tortillas as well as shirt Safaf from good linen soft and touched the country and the good and others.

View Publication Preview PDF