In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Background: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as K
... Show MoreSalmonellosis in poultry is one of the most significant bacterial infections causing mortality, reduced production, and serious economic losses. This study aimed to study the molecular diversity among Salmonella isolates and investigate the epidemiological spread of these bacteria in broiler and layer chicken flocks in five different farms in Karbala, Iraq, using random amplified polymorphic DNA (RAPD) polymerase chain reaction (PCR). In total, 217 cloac a swabs were collected from the farms, out of which 129 and 88 swabs were taken from broiler and layer chickens. The samples were screened by PCR for S. enterica subsp. enterica using primers specific for the invA gene. Afterward, RAPD-PCR with uniplex or multiplex octamer primers was appli
... Show MoreGivers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show MoreThis research shows the importance of Baghdad in the field of urban heritage and was demonstrated in the Ibn al-Fiqh al-Hamdani's book Baghdad the City of Peace in which he focused on many urban aspects and reviewing its historical importance by connecting them with modern events and the role they play in cultural and civilized construction which included: mosques, schools and markets etc. and the service providing institutions and other pillars of the Islamic cities through showing the development back then and its importance as an integral part of the urban and cultural heritage of the Islamic cities in general and Baghdad city in particular.
In his book Baghdad the City of Peace, Ibn al-Faqih Hamadhaani
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Abstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show Moreהמחקר הזה עוסק באחד מהסופרים העבריים שנחשבו בעלי־השפעה בתהליך הספרות
העברית החדשה על אף גילו הקצר ועל אף שהוא השאיר עזבון ספרותי מועט , אך עם זה דמותו עולה
לענינו גם מתוך כתביו המעטים כאילו הם טבועים בחותם, הסופר הזה הוא מרדכי זאב פיארברג.
במחקר זה טיפלנו בחייו של המספר הזה בקיצור וגם ביצירותיו באופן כללי, ובסימנים המאפינים
את גיבוריו, ובמיוחד גיבורו של הסיפור "לאן?" שהוא אכן גיבור פיארברגי מובהק והוא נת
Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar
... Show MoreAbstract:
The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)
... Show More