In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreJPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas
... Show MoreAl-Rustamiyah plant is the oldest and biggest sewage treatment plant in Iraq; it locates in the south of Baghdad city. The plant suffers from serious problems associated with overflow and low capacity. The present work aims to upgrade the heart of biological treatment process through suggesting the use of membrane bioreactor; (MBR). In this work, fouling of membrane during sewage treatment has been analyzed experimentally and theoretically by fouling mechanisms. Aeration has been applied in order to control fouling through producing effective diameters of air bubbles close to the membrane walls. Effect of air flow rate on flux decline was investigated. Hermia's models were used to investigate the fouling mechanisms. The results showed th
... Show MoreAn experimental study was conducted on pressure drop of water flow through vertical cylindrical packed beds in turbulent region and the influence of the operating parameters on its behavior. The bed packing was made of spherical and non-spherical particles (spheres, Rasching rings and intalox saddle) with aspect ratio range 3.46 D/dp 8.486 obtaining bed porosities 0.396 0.84 and Reynolds number 1217 21758. The system is consisted of 5 cm inside diameter Perspex column, 50 cm long; distilled water was pumped through the bed with flow rate 875, 1000, 1125, 1250,1375 and 1500 l/h and inlet water temperature 20, 30, 40 and 50 ˚C. The packed bed system was monitored by using LabVIEW program, were the result
... Show MoreChemical bath deposition was used to synthesize ZnO nanorods (NRs) on glass and fluorine_doped tin oxide (FTO) substrates. X-ray diffraction was performed to examine the crystallinity of ZnO nanorod. Results showed that ZnO NRs had a wurtzite crystal structure. Field emission scanning electron microscopy images showed that glass sample had rod-like structure distribution with (50 nm) diameter and average length of approximately (700 nm), whereas the FTO-coated glass sample had 25 nm diameter and average length of approximately 950 nm. The direct optical transition band gaps of the glass and FTO_coated glass samples were( 4 and 4.43 eV), respectively. The structural and optical properties of the synthesized ZnO p
... Show MoreAs the diversity and characteristics of Trichoderma species are difficult to determine using morphological methods, henceforth molecular tools are crucial. This study utilized random amplified polymorphic DNA (RAPD) technique to investigate the genetic diversity of Trichoderma with sexual phase Hypocrea and to identify similarities and differences in the phylogenetic tree. Nine Iraqi Trichoderma strains (four strains of T. atroviride, one strain of Hypocrea lixii, two strains of T. gamsii and two strains of T. longibriantium) were examined in this research. The genomic DNA of each species was extracted and amplified with each of the fiv
... Show More