Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Experimental and theoretical investigations of seepage reduction through zoned earth dam material with special core
...Show More Authors

View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Gingival microleakage of composite restorations with different bonding protocol in class II cavity treated with chlorhexidine (an in-vitro study)
...Show More Authors

ABSTRACT Background: One of the challenges to use chlorhexidine is its effect on the amount of microleakage after restoration; however, use of the materials with antibacterial properties after tooth preparation and before restoration has been widespread. The objective of this, in-vitro, study was to evaluate the influence of consepsis (chlorhexidine gloconate disinfectant) application on microleakage in class II cavities restored with light cured composite using universal adhesive system; etch and rinse technique –self etch technique. Materials and Methods: Forty class II cavities were prepared on mesial and distal surfaces of 20 non-carious mandibular third molars. The cavities were divided into four groups; (n =10 for each group).

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Interpretation of Mud Losses in Carbonates Based on Cuttings Description, Well-Logging, Seismic and Coherency Data
...Show More Authors

    Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.

   The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 02 2014
Journal Name
Sino Us
“Actual Experience”: Correcting Misconceptions Through Analyzing Harriet Wilson’s Our Nig
...Show More Authors

African-American writers during the 19th century wrote in the shadow of the prominent romance, sentimental, and domestic fiction. Harriet Wilson’s Our Nig (1859) reflects an “alternative social character”, for the female protagonist suffers racism in the free North, because she is a mulatto child. Through depicting the life of free blacks, who supposedly lives a better life than Southern slaves, Wilson exposes how she has actually lived and sensed life in antebellum America. According to Raymond Williams (2011), there are two kinds of literary writings. The first represents the general tendency of the age, and he calls it “dominant social character”; representing the majority content of both the public writing and speaking. But, a

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Aims Mathematics
Solving quaternion nonsymmetric algebraic Riccati equations through zeroing neural networks
...Show More Authors

<abstract><p>Many variations of the algebraic Riccati equation (ARE) have been used to study nonlinear system stability in the control domain in great detail. Taking the quaternion nonsymmetric ARE (QNARE) as a generalized version of ARE, the time-varying QNARE (TQNARE) is introduced. This brings us to the main objective of this work: finding the TQNARE solution. The zeroing neural network (ZNN) technique, which has demonstrated a high degree of effectiveness in handling time-varying problems, is used to do this. Specifically, the TQNARE can be solved using the high order ZNN (HZNN) design, which is a member of the family of ZNN models that correlate to hyperpower iterative techniques. As a result, a novel

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Opcion
Vocabulary acquisition through viber emoticons messaging app among Iraqi students
...Show More Authors

Rapid increase in the use of smart mobile phones and the proliferation of social media networking programs such as facebook, tweeter, whatsapp and viber etc. affects the learning attitude of second language. This research aims to investigate the effects of emoticons provided by Viber application on Iraqi students in context of vocabulary acquisition. 60 Iraqi students are randomly selected from X international school with the average of age 7 to 9 years. All the subjects are given 50 English words for five weeks, 25 English words were written on papers and the rest Viber stickers laden with English words. The results show that students recognize the vocabularies given by Viber stickers better than the written vocabulary. In general, student

... Show More
Scopus (9)
Scopus