In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.
In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at
... Show MoreIn this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in
... Show MoreBroyden update is one of the one-rank updates which solves the unconstrained optimization problem but this update does not guarantee the positive definite and the symmetric property of Hessian matrix.
In this paper the guarantee of positive definite and symmetric property for the Hessian matrix will be established by updating the vector which represents the difference between the next gradient and the current gradient of the objective function assumed to be twice continuous and differentiable .Numerical results are reported to compare the proposed method with the Broyden method under standard problems.
The solar eclipse occurs at short time before the crescent birth moment when the moon near any one of moon orbit nodes It is important to determine the synchronic month which is used to find Higree date. The 'rules' of eclipses are:
Y= ± 0.997 of Earth radius , the solar eclipse is central and 0.997 < |Y| < 1.026 the umbra cone touch the surface of the Earth, where Y is the least distance from the axis of the moon's shadow to the center of the Earth in units of the equatorial radius of the Earth.
A new model have been designed, depend on the horizontal coordinates of the sun, moon, the distances Earth-Moon (rm), Earth-sun (rs) and |Y| to determine the date and times of total solar eclipse and the geogra
... Show MoreIn this research design was treated gap laser mathematically and practically Bashaddam model Raasi simple and new and we have found that there is a good match in the practical and theoretical results
This study included isolation and identification of the fungi associated with Aloe vera (L.) in nurseries and plant gardens. The results showed that the fungi Alternaria alternata, Fusarium oxysporum, Fusarium solani, Nigrospora oryzae, Cladosporium herbarum, Stemphylium botryosum, Aspergillus niger, Penicillium sp. were isolated from the diseased leaves of Aloe vera showing spots and blight symptoms. The percentages of disease incidence in March, Jun and August were found to be 5, 50 and 60 %, respectively. Pathogenicity test of Alternaria alternata, Fusarium oxysporum, Nigrospora oryzae and Cladosporium herbarum showed that disease index were 50, 25,25and 12.5 %,
... Show MoreObjectives: To assess the relation between breast cancer & blood groups, identify the importance of women
age group and the relation of age with breast cancer.
Methodology: The study was performed on (115) women who were diagnosed with breast cancer in different
stages of disease and different ages. Blood samples were taken from them to demonstrate their blood groups and
(20) fresh tumor tissue samples were obtained; the tumor tissue used as a source of lectin for hemagglutinate
with erythrocyte of different blood groups. The study conducted at Baghdad Teaching Hospital and Radiation &
Nuclear Medicine Hospital from January, 2007 through June 2007.
Results: The study shows that the highest percentage of women
This research examines the phenomenon of the Arabic language repeated in the Qur'an and poetry, as some morphological formulas are valid in their uses and indications in more than one way. search).
This research aims to distinguish the reef environment from the non-reef environment. The Oligocene-Miocene-succussion in western Iraq was selected as a case study, represented by the reefal limestone facies of the Anah Formation (Late Oligocene) deposited in reef-back reef environments, dolomitic limestone of the Euphrates Formation (Early Miocene) deposited in open sea environments, and gypsiferous marly limestone of the Fatha Formation (Middle Miocene) deposited in a lagoonal environment. The content of the rare earth elements (REEs) (La, Ce, Pr, Nd, Sm, Eu, Gd, Tb, Dy, Er, Ho, Tm, Yb, Lu, and Y) in reef facies appear to be much lower than of those in the non-reef facies. The open sea facies have a low content of REEs due to bein
... Show More