In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe current research aims to identify the level of strategic orientation and its dimensions (vision, mission, goals, and values) in the Iraqi National Security Service (INSS). The researchers followed the descriptive analytical approach as one of the forms of analysis and organized scientific interpretation to describe a specific phenomenon or problem, adopting the form questionnaire being the main source in collecting data and preparing for this. Based on the program of the Statistical Package of Social Sciences (SPSS 26) to analyze the data and come up with the final research results to identify the opinions of the intended sample on the subject of research, and the questionnaire of (20) paragraphs included the search variable, and was
... Show MoreObjective: To assess the role of tumour necrosis factor alpha level and genotyping in susceptibility to leishmaniasis.Method: The case-control study was conducted from March to July 2021 at Baqubah Teaching Hospital, Diyala, Iraq,and comprised patients of cutaneous leishmaniasis in group A and healthy controls in group B. The serum level andsingle nucleotide polymorphisms of tumour necrosis factor-alpha rs41297589 and rs1800629 were compared betweenthe groups. Data was analysed using SPSS 28.Results: Of the 150 subjects, there were 75(50%) in group A; 39(52%) males and 36(48%) females with mean age23.91±13.14 years. The remaining 75(50%) subjects were in group B; 38(50.7%) males and 37(49.3%) females withmean age 22.84±4.35 years.
... Show MoreAim of the present study is Identification of specific gene for GPCR using specific primers .and identification of difference in PCR analysis in patients with heart thrombosis and compared with healthy, Sequencing of PCR product regarding GPCR compared for all three subject, Identification the similarity of human GPCR with local strain of yeast fifty healthy control and fifty patients with thrombosis which diagnosed medically with cardiac specific troponin t, troponin 1 levels and electro myocardiogram ECG. The aged for all subjects ranged (39-75) years patients were lying in cardiac care unit at Ibn- al- Nafees teaching hospital and Sheikh Zayed teaching hospital. Genomic DNA of whole blood was extracted from buffy coat and cell cu
... Show MoreBackground: Multiple sclerosis (MS) is a chronic neurodegenerative autoimmune disease mediated by autoreactive T cells against myelin-basic proteins. Cytokines are suggested to play a role in the etiopathogenesis of the disease. Among these cytokines is interleukin-2 (IL-2). Aim of the study: To investigate the association between IL2+166 G/T single nucleotide polymorphism (SNP: rs2069763) and MS in Iraqi patients. Serum level of IL-2 was also detected. Anti-rubella IgG antibody was further determined in the sera of patients. Patients and methods: Eighty MS patients (28 males and 52 females; age mean ± SD: 39.2 ± 16.1 years) and 80 healthy control matched patients for age (32.15 ± 16.13 years) and gender (28 males and 52 females) were en
... Show MoreBackground: The genetic polymorphisms of vitamin D receptor (VDR) have an association with thalassemia development, additionally to the environmental elements that elicited the disorder in the genetically predisposed individuals. As well, VDR functions responsible for the regulation of bone metabolism, such its part in immunity. Aim: The sitting study intended to inspect the association between thalassemia disease and the genetic polymorphisms of VDR among the Iraqi population then compared these findings to other findings of thalassemia patients in other different ethnic populations. Materials and methods: The restriction enzymes Bsm-I and Fok-I were applied to determine the genetic polymorphisms frequencies of VDR by a Polymerase Chain Re
... Show MoreThere is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn