In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Khadija Al-Hadithi was known for her love of the Arabic language. She was a distinguished and serious phenomenon in Arabic science and culture. She was born in Basra Governorate, one of the ancient and important cities in the history of Arabic grammar and one of the centers of the intellectual and scientific movement. The Basra Grammar School emerged there and made numerous achievements in the field of Arabic linguistics that remain an important source for students of the specialty.
Throughout the ages,the methods of human production, exchange, and communication have not changed,and lifestyles have not witnessed rapid and comprehensive changes except since the presence of advanced and modern technologies for information and communication, which led to the emergence of new patterns of intellectual works and innovations that are dealt with and circulated through the virtual medium.These innovations are in many legal disputes, and domain names are one of the most important foundations of information networks, as they are the key to entering the virtual world and distinguishing websites. Because of the novelty of domain names,many attacks have occurred on them, which are closely related to intellectual property rights. And
... Show MoreBackground The escalating global concern over increased body weight in adolescents, coupled with the rising rates of adolescent pregnancy worldwide, presents a significant challenge to healthcare systems. We plan to identify the maternal and neonatal consequences associated with pre-pregnancy overweight in adolescent women. Methods Throughout five years, all singleton adolescent pregnant women with pre-pregnancy self-reported body mass index (BMI) of 18.5– ≤ 29.9 were involved during the first-trimester visit. Two groups were generated: overweight and appropriate-weight (BMI 25–29.9 and 18.5–24.9, respectively). Obstetric and neonatal outcomes were observed prospectively and statistically adjusted for the confounding factors.
... Show MoreAfrican Journal of Advanced Pure and Applied Sciences (AJAPAS)
New compounds containing heterocyclic units have been synthesized. These compounds include 2-amino 5- phenyl-1,3,4-thiadiazole (1) as starting material to prepare the Schiff bases 2N[3-nitrobenzylidene -2 hydroxy benzylidene and 4-N,N-dimethyl aminobenzylidene] -5-phenyl-1,3,4-thiadiazole (2abc) , 2N[3-nitrophenyl, 2-hydroxyphenyl or 4-N,N-dimethylaminophenyl] 3-]2-amino-5-phenyl-1,3,4-thiadiazole]-2,3-dihydro-[1,3]oxazepine-benzo-4,7-dione] (3abc), 2N[3-nitrophenyl,2-hydroxyphenyl,4-N,N-dimethylaminophenyl]-3-[2-amino-5-phenyl-1,3,4-thiadiazole-2-yl]-2,3-dihydro-[1,3]oxazepine-4,7-dione[(4abc), 2-N-[3-nitrophenyl, 2-hydroxyphenyl or 4-N,N-dimethylaminophenyl]-3-[2-amino-5-phenyl-1,3,4-thiadiazole-2yl]-1,2,3-trihydro-benzo-[1,2-e][1,3] diaz
... Show MoreThe performance of single and two stage solar concentrator were studied ' " The ratio of the primary to the secondary mirrors diameter is taking to be 0.5, depending on the theoretical calculation for the accumulated energy by the concentrator with ratio between 0.0 to 0.9. The design of the systems were designed and examined by using a ray-tracing program. The efficiency of the single and the two stage concentrators are calculated and compared with and without cooling systems.
The research studies the sculptural formation in the third millennium: styles and trends, by taking the most important results of sculpture in the third millennium. The problem of the research is to search for the new sculptural formation in what it constitutes of social and human importance, and what are the important factors in forming the contemporary sculptural structure, and what is the mechanism of showing and producing the new formation. The research requires the study of the most important thing that the (sculptural formation in the third millennium styles and trends) represents. The importance of research depends on the importance of the sculptural formation after the twentieth century and the importance that the for
... Show MoreThe research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.
Contemporary Media Stylistics permits readers to explore a variety of methodological applications to data analysis. Recent developments in technology and media communication provide linguists and stylisticians with authentic data for analysis based on real-life communication.