In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
During the last two decades, nanomaterial application has gained a significant attraction into asphalt technology due to their effect in enhancing asphalt binder improving the asphaltic mixture. This study will modify the asphalt binder with two different nano types, nano SiO2 and CaCO3, at levels ranging from 1% to 7%. The resulting optimum nano-modified Asphalt will be subject to a series of rheological tests, including dynamic shear rheometer (DSR), Viscosity, and bending beam rheometer (BBR) to determine asphalt binder sensitivity towards low-medium-high temperature range. Results indicate that both nano types improved the physical characteristics of Asphalt, and 5% by weight of Asphalt was suggested as a reasonable dosage of nano-SiO2
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreGivers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show MoreThis study deals with the field of acieving the manuscripts of Islamic sciences by the great Imam ibn Kamal Pasha, but the mentioned book requires a great effort to explain what it contains of sciences, and to appear what it has contained
Abstract:
The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)
... Show Morethe study of social phenomena in this direction is, the sign of deviousness to the segments of the circumstance with their conditions and circumstances, then pointed to the uniforms that they were adorned by the tortillas as well as shirt Safaf from good linen soft and touched the country and the good and others.
המחקר הזה עוסק באחד מהסופרים העבריים שנחשבו בעלי־השפעה בתהליך הספרות
העברית החדשה על אף גילו הקצר ועל אף שהוא השאיר עזבון ספרותי מועט , אך עם זה דמותו עולה
לענינו גם מתוך כתביו המעטים כאילו הם טבועים בחותם, הסופר הזה הוא מרדכי זאב פיארברג.
במחקר זה טיפלנו בחייו של המספר הזה בקיצור וגם ביצירותיו באופן כללי, ובסימנים המאפינים
את גיבוריו, ובמיוחד גיבורו של הסיפור "לאן?" שהוא אכן גיבור פיארברגי מובהק והוא נת
Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Abstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the