In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreRA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2
Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show MoreAmoxicillin have been conjugated with metronidazole as possible mutual prodrug to get a wider spectrum of activity by acting on aerobic and anaerobic bacteria, have antifungal activity, to provide protection for beta lactam ring of amoxicillin and also to improve patient compliance as it given as a single dose therapy. The structures of the synthesized compound were confirmed and characterized using elemental microanalysis (CHN), IR and some physiochemical properties. Biological study was done by using disc diffusion method against different bacterial strains which are , Staphylococcus aureus , Salmonella typhie , Pseudomonas aeruginosa , E. coli , Klebsiella pneumonia and fungi ( Candida albicans) . using nutrien
... Show MoreObjective: To assess the role of tumour necrosis factor alpha level and genotyping in susceptibility to leishmaniasis.Method: The case-control study was conducted from March to July 2021 at Baqubah Teaching Hospital, Diyala, Iraq,and comprised patients of cutaneous leishmaniasis in group A and healthy controls in group B. The serum level andsingle nucleotide polymorphisms of tumour necrosis factor-alpha rs41297589 and rs1800629 were compared betweenthe groups. Data was analysed using SPSS 28.Results: Of the 150 subjects, there were 75(50%) in group A; 39(52%) males and 36(48%) females with mean age23.91±13.14 years. The remaining 75(50%) subjects were in group B; 38(50.7%) males and 37(49.3%) females withmean age 22.84±4.35 years.
... Show More