In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Background: Rheumatoid arthritis is an autoimmune disease that affects mainly the synovial membranes and articular structures and is characterized by chronic, systemic inflammation involving multiple joints.Being a synovial joint, the Temporomandibular Joint is subject to the same disorders affecting other synovial joints, including RA.Beside it was considered as a specific serological marker for diagnosing RA disease ,antibodies to cyclic citrullinated peptide have proven to be associated with joints destruction, though; it may play a potential role in the prediction of the disease severity. Materials and Methods: Sixty nine individuals (69) were enrolled in this study, forty nine (49) were patients diagnosed with Rheumatoid Arthritis, a
... Show MoreShe noted most of the results of research conducted on the use of computers and the Internet in the areas of administrative, economic, agricultural and educational to a significant improvement in learning outcomes of these groups in the development of mechanisms of action, has increased rates of computer use and applications in various spheres of life at very fast pace so that the computer and the Internet is a vital part of any activity, whether administrative or research or the media, hence it can be said that the use of computers and the Internet in the management of public relations activities in any organization can accelerate the pace of echo positive goals and purposes of public relations, this study comes to looking at us
... Show MoreFactory is trotting home favorite of of Aeidid of Iraqi families since he Amta imparted to the taste of the housewife on the method of processing and preparation and the possibility of using some of the ingredients to raise the nutritional value of meat, sesame and other, but how keep Bz'zajh this product Atne storage
The pre - equilibrium and equilibrium double differential cross
sections are calculated at different energies using Kalbach Systematic
approach in terms of Exciton model with Feshbach, Kerman and
Koonin (FKK) statistical theory. The angular distribution of nucleons
and light nuclei on 27Al target nuclei, at emission energy in the center
of mass system, are considered, using the Multistep Compound
(MSC) and Multistep Direct (MSD) reactions. The two-component
exciton model with different corrections have been implemented in
calculating the particle-hole state density towards calculating the
transition rates of the possible reactions and follow up the calculation
the differential cross-sections, that include MS
Provisions and controls on the disposal of public funds between Sharia and law
Research Summary
That money is the foundation of life and one of the most important reasons for the reconstruction of the land, and God is the owner
The real value of this money, God has borrowed some individuals on public money, and people
They are charged with preserving it, since it is beneficial to them all, without anyone taking it
To himself, and the guardian is charged by God to protect this money and aggression
Because of its power, authority, various organs and public servants of the province
Upon him; Because the assault on public money by employees and others in the organs of the state
And exploitation of their jobs and this
The bubble columns are widely used as a two or three phase reactor in industrial chemical process such as absorption, biochemical reactions, coal liquefaction, etc. To design such a column, two main parameters should be taken in consideration, the gas hold-up (), and the liquid phase mass transfer coefficient KLa. The study includes the effect of gas velocity and the addition of alcohols on gas hold-up and mass transfer coefficient in bubble column with draught tube when the length of the column is 1.5m and the ratio of the draught tube diameter to the column diameter equals 0.5 and the air dispersion into the base of the draught tube using a multi hole tuyere is equivalent to a diameter of 0.15 mm and
... Show MoreThe research aims to understand the psychological status of and the feeling of loneliness of the trainees (recently released detainees) participating in the training and rehabilitation courses held in the Technical College - Baghdad. The study was conducted on a specimen of (23) trainees. An open questionnaire was adopted which included one question that was ( What was your feeling psychologically and socially before taking part in the training course?) , also the feeling of loneliness Scale , designed by ( Russel,Peplau, Cutrona /University of California Los Angeles ) was implemented after the courses .
&
... Show MoreThe preparation, spectroscopic characterisation of complexes derived from the mixed ligands with CdII, ZnII and CoII metal ions with Schiff base, Dithiocarbamates (DTCs) and 8-Hydroxyquinoline are reported. The compounds that prepared have been defined via; chloride content, F.T-IR, UV-Vis 1H-NMR spectroscopy and C.H.N.S, as well as conductance and magnetic susceptibility.All data which collected from such methods specified complexes with 6 coordinates in solution and solid states. The biologicalactivity that is related to all the prepared compounds which were screened for their antimicrobial activitiesagainst (G+ and (G-)). The data that collected from biological activity indicate that complexes will have extra activity against such tested
... Show MorePure and Fe-doped zinc oxide nanocrystalline films were prepared
via a sol–gel method using -
C for 2 h.
The thin films were prepared and characterized by X-ray diffraction
(XRD), atomic force microscopy (AFM), field emission scanning
electron microscopy (FE-SEM) and UV- visible spectroscopy. The
XRD results showed that ZnO has hexagonal wurtzite structure and
the Fe ions were well incorporated into the ZnO structure. As the Fe
level increased from 2 wt% to 8 wt%, the crystallite size reduced in
comparison with the pure ZnO. The transmittance spectra were then
recorded at wavelengths ranging from 300 nm to 1000 nm. The
optical band gap energy of spin-coated films also decreased as Fe
doping concentra
The environment contemporary works for the insurance companies have seen a number of technological developments and changes rapidly in light of the intense competition in the insurance market, and this affects human behavior in the workplace, and to director in his work needs to be a set of managerial skills. so we find compensation activity in companies insurance needs a high managerial skills, so that compensation, director of the settlement procedure successfully. So research aims to test two hypotheses two major belongings variables search using some statistical methods to extract the results and interpretation and analysis (such as arithmetic mean, standard deviation, percentages, Alpha Cronbach's coefficient, Pearson correlation co
... Show More