Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Genetic Variations of Echinococcus granulosus Isolated from Sheep and Cows by Using Fingerprint DNA Method in Iraq
...Show More Authors

The fingerprinting DNA method which depends on the unique pattern in this study was employed to detect the hydatid cyst of Echinococcus granulosus and to determine the genetic variation among their strains in different intermediate hosts (cows and sheep).  The unique pattern represents the number of amplified bands and their molecular weights with specialized sequences to one sample which different from the other samples.   Five hydatitd cysts samples  from cows and sheep were  collected, genetic analysis for  isolated DNA was done using PCR technique and  Random Amplified Polymorphic DNA reaction(RAPD) depending on (4) random primers, and the results showed:      

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic diversity of Capsicum annuum L. in local and imported samples in Iraq by using RAPD-PCR
...Show More Authors

Genetic variation was studied in 22 local and imported samples collected from local Iraqi market by using random amplified polymorphic DNA (RAPD-PCR). Five randomly primers set were used in this study. These primers produced 292 bands. Molecular weights of these bands ranged between 1.8 Kb (1800 bp) to 150 bp. The percentage of polymorphic bands is 100%, with one distinguished band which is produced by using C52 primer. The other primers did not produce any distinguished band. The results of Dendrogram of the studied samples depended on RAPD-PCR results by using Jaccard coefficient for genetic similarity was distributed the samples into 8 groups. This Dendrogram revealed a higher similarity between Iraqi/Yousifia green bell pepper and Jo

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 11 2019
Journal Name
Day 3 Wed, November 13, 2019
Drill Bit Selection Optimization Based on Rate of Penetration: Application of Artificial Neural Networks and Genetic Algorithms
...Show More Authors
Abstract<p>The drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the</p> ... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Genetic Structure, Transmission, Clinical Characteristics, Diagnosis, Treatment and Prevention of Coronavirus Disease 2019 (COVID-19): A Review
...Show More Authors

The novel severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) caused a pandemic of coronavirus disease 2019 (COVID-19) which represents a global public health crisis. Based on recent published studies, this review discusses current evidence related to the transmission, clinical characteristics, diagnosis, management and prevention of COVID-19. It is hoped that this review article will provide a benefit for the public to well understand and deal with this new virus, and give a reference for future researches.

View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Human Gene
Tissue inhibitor of metalloproteinase-1 (TIMP-1) serum level and genetic polymorphisms associated with cutaneous leishmania infections
...Show More Authors

Introduction: Cutaneous leishmaniasis is considered a parasitic contagion resulting from the flagellated parasite belonging to the genus of Leishmania. Also, cutaneous leishmaniasis is a zoonotic ailment transmitted through the bloodsucking sand-flies bite (belonging to the Phlebotomus genus). The disease's reservoirs included wild or semi-domesticated animals, in general rodents and dogs. Tissue inhibitor metalloproteinase-1 (TIMP-1) is one of the extracellular matrix proteins that have a role in vessel wall degeneration and aneurysm development. In addition, it belongs to the zinc-dependent endopeptidases family that are involved in the degradation of connective tissues proteins which are included in vascular integrity maintenance. The Ge

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 20 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Genetic Polymorphisms at TNF-Alpha Receptors Associated some Autoimmune Diseases and Response of Anti-TNF Biologics: Review
...Show More Authors

Some genetic factors are not only involved in some autoimmune diseases but also interfere with their treatment, Such as Crohn's disease (CD), Rheumatoid Arthritis (RA), ankylosing spondylitis (AS), and psoriasis (PS). Tumor Necrosis Factor (TNF) is a most important pro-inflammatory cytokine, which has been recognized as a main factor that participates in the pathogenesis and development of autoimmune disorders. Therefore, TNF could be a prospective target for treating these disorders, and many anti-TNF were developed to treat these disorders. Although the high efficacy of many anti-TNF biologic medications, the Patients' clinical responses to the autoimmune treatment showed significant heterogeneity. Two types of TNF receptor (TNFR); 1 an

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
2D Seismic Data Analysis of Judaida Structure, Northern Iraq
...Show More Authors

This research aims to study the structural analysis of the 2D reflection seismic data for the Judaida subsurface structure located in Kirkuk province, northern Iraq. It is located 60 Km southwest of Kirkuk oil field, and 35 Km southwest of Jambur oil field, the Daquq River passes through the study area. The reflectors in the seismic section were picked and identified by using the synthetic seismograms generated from the logs data of the Jd-1 well. Three main seismic reflectors, Fatha, Jeribe, and the Euphrates were chosen. These mentioned sedimentary formations were deposited during the Middle Miocene, Lower Miocene, and Early-Mid Miocene respectively. Time and depth maps were drawn for these three reflectors by processing average data f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A review of Medical Diagnostics Via Data Mining Techniques
...Show More Authors

Data mining is one of the most popular analysis methods in medical research. It involves finding patterns and correlations in previously unknown datasets. Data mining encompasses various areas of biomedical research, including data collection, clinical decision support, illness or safety monitoring, public health, and inquiry research. Health analytics frequently uses computational methods for data mining, such as clustering, classification, and regression. Studies of large numbers of diverse heterogeneous documents, including biological and electronic information, provided extensive material to medical and health studies.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Thu Feb 16 2017
Journal Name
Signal, Image And Video Processing
Enhancing Prony’s method by nuclear norm penalization and extension to missing data
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref