Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Some Estimation methods for the two models SPSEM and SPSAR for spatially dependent data
...Show More Authors

ABSTRUCT

In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error          ( λ ) in the model (SPSEM), estimated  the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
The Intersection of AI and the Internet of Things (IoT): Transforming Data into Intelligence
...Show More Authors

View Publication
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Split and Merge Regions of Satellite Images using the Non-Hierarchical Algorithm of Cluster Analysis
...Show More Authors

يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 11 2023
Journal Name
Applied Sciences
A Preliminary Study and Implementing Algorithm Using Finite State Automaton for Remote Identification of Drones
...Show More Authors

Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Advanced Computer Science And Applications
Fast Hybrid String Matching Algorithm based on the Quick-Skip and Tuned Boyer-Moore Algorithms
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Saudi Endodontic Journal
Comparison of root canal transportation and centering after instrumentation through conservative and traditional access cavities using different file systems
...Show More Authors
Introduction:

While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).

Materials and Methods:

Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky: Sait Faik'in "Havada Bulut" Adlı Hikayesinde Fiil Kiplerinin İncelenmesi.
...Show More Authors

This research paper which is entitled “Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky” deals with the forms of verbs (i.e., kinds of tenses and suffix analysis). It is one of the applied studies. Verbs are basic elements in Turkish sentences. Their function is to state the predicate which is a sentential essential part. Verbs denote sentence construction, action and formal aspects. Forms are added to the base of verbs in the Turkish language giving the verbs their final structures. Such structures are set in a distinct planned way. The verbs used in the Turkish language which are distinguished by one of these forms are known as simple tense verbs.

Sait Faik'in ( "Havada Bulut" adlı Hikayesinde Fi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref