Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Public confidence in the content of satellite channels during crises
...Show More Authors

Most studies combine that it is important to determine the extent of the public's trust TV for two reasons. First of knowing the impact of satellite TV audience ranges and the second determining public outlets for Information Find regard to the extent of the public's confidence in knowing the contents of the satellite during the occupation of Mosul crisis by organizing the Islamic state in Iraq and the Levant And the researcher developed a questionnaire to find out the public's confidence statement satellite contents provided by the questions related to exposandscale.

 

     The researcher audience chose the city of Baghdad to the suitabil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Some Estimation methods for the two models SPSEM and SPSAR for spatially dependent data
...Show More Authors

ABSTRUCT

In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error          ( λ ) in the model (SPSEM), estimated  the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Inverting Gravity Data to Density and Velocity Models for Selected Area in Southwestern Iraq
...Show More Authors

The gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km.

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Mar 17 2016
Journal Name
International Journal Of Computer Applications
Analysis of Wind Speed Data and Annual Energy Potential at Three locations in Iraq
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Saudi Endodontic Journal
Comparison of root canal transportation and centering after instrumentation through conservative and traditional access cavities using different file systems
...Show More Authors
Introduction:

While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).

Materials and Methods:

Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this

... Show More
View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic and Bacteriological Study of Aerobic Bacteria Which Causes Cesarean Section Contamination in Women in The City of Diwaniya
...Show More Authors

    This study was designed  to stand  on the most important causes of contamination in sesarean section in women by the aerobic bacteria species the bacteria isolates  were diagnosed in the Maternity and Children  Hospital in the Qadsiya province and in the special clinics. Sixty five persent of women having cesarean operation were contaminated with different bacteria in different ratios. Staphylococcus aureus  showed the higher percentage  (62.4) , Pseudomonas.aerogenosa  18% , E.coli 9.5% and Proteus.spp (6,4%).While Streptococcus pyogens showed lowest percentage 3.6% .  The results of antibiotic sensitivity test for all bacteria  isolates showed  Chloramphenicol and Ami

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 06 2021
Journal Name
Animals
Comparison of the Genetic Structure of Invasive Bigheaded Carp (Hypophthalmichthys spp.) Populations in Central-European Lacustrine and Riverine Habitats
...Show More Authors

Bigheaded carps (bighead carp, Hypophthalmichthys molitrix, and silver carp, Hypophthalmichthys nobilis) and their hybrids play an important ecological and economic role in their original habitat, while their introduced stocks may pose serious ecological risks. To address questions about the persistence and invasiveness of these fish, we need to better understand their population structures. The genetic structures of bigheaded carp populations inhabiting Lake Balaton and the Tisza River were examined with ten microsatellite markers and a mitochondrial DNA marker (COI). The Lake Balaton stock showed higher genetic diversity compared with the Tisza River stock. Based on hierarchical clustering, the Tisza population was characterized o

... Show More
View Publication
Crossref (5)
Crossref