In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
تعد الموازنة الأداة الأساسية لتنفيذ أولويات أية دولة، ويتوجب النظر إليها في ضوء المناخ الاجتماعي والسياسي والاقتصادي، لأنها تساعد في توجيه الاقتصاد لتحقيق النمو ورفع مستوى الرفاهية. اعتمدت وزارة المالية في أعداد الموازنة السنوية بعد 9/4/ 2003 أسلوباً مغايراً لما كان معتمداً في العقود الماضية، إذ كانت هناك موازنتين الأولى الموازنة الجارية، والثانية الموازنة الاستثمارية رغم وجود قانون يحتم إصدار موازنة
... Show Moreהמחקר הזה עוסק באחד מהסופרים העבריים שנחשבו בעלי־השפעה בתהליך הספרות העברית החדשה על אף גילו הקצר ועל אף שהוא השאיר עזבון ספרותי מועט, אך עם זה דמותו עולה לענינו גם מתוך כתביו המעטים כאילו הם טבועים בחותם, הסופר הזה הוא מרדכי זאב פיארברג.
במחקר זה טיפלנו בחייו של המספר הזה בקיצור וגם ביצירותיו באופן כללי, ובסימנים המאפינים את גיבוריו, ובמיוחד גיבורו של הסיפור "
... Show MoreThis study is a trail to know if the genes controlling some of heavy metals resistance ( lead, zinc, cadmium, cromium) in two types of pathogenic bacteria E. coli as gram negative bacteria and S. aureus as gram positive bacteria, present on the β-lactamase plasmid. Ten isolates of each bacterial types which produced β-lactamase enzyme, were cultivated in the presence of acridine orange. The growing in the presence of acridine orange resulted in loss of the β-lactamase genes in S. aureus and E. coli, and loss of the heavy metals resistance in S. aureus, while the resistance of E. coli against heavy metals still without any change. The results indicate that the genes for heavy
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreIn this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show MoreIn this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m
... Show Morethis research has discussed some social phenomena in lslamic society through the book of the unique contract of lbn abed rabbi al-andalusi. ln the beginning , he gave an account of his life.
Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show MoreThe Gray Wolf Optimizer (GWO) is a population-based meta-heuristic algorithm that belongs to the family of swarm intelligence algorithms inspired by the social behavior of gray wolves, in particular the social hierarchy and hunting mechanism. Because of its simplicity, flexibility, and few parameters to be tuned, it has been applied to a wide range of optimization problems. And yet it has some disadvantages, such as poor exploration skills, stagnation at local optima, and slow convergence speed. Therefore, different variants of GWO have been proposed and developed to address these disadvantages. In this article, some literature, especially from the last five years, has been reviewed and summarized by well-known publishers. Fir
... Show More