In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its count
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreBarhi dates fruit are one of the most important date palm cultivars which are some of their properties they are mostly eaten and sold at the khalal stage when it has become yellow compared with rutab stage. At this stage the fruit loses its astringency and becomes sweet and best texture, therefore. High moisture content and rapid ripening of Barhi dates shorten their shelf life, as well the Khalal stage lasts for about 4 weeks until the ripening of the fruits begins and transfer to rutab stage. In the present study, Barhi dates packaging in the first by common air - packaging and
second by Modified atmosphere packaging, MAP A (5% O2 + 20% CO2) and MAP B (40%O2+20%CO2) and stored for 30 days at different temperatures 5 and 20 °C, re
This research dealt with study of cladistics taxonomy of five species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This research support strongly delimiting the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as the seed forms were ranging from lenticular to trigonous. In terms of size calculations, the seeds of R. vesicarius was recorded the higher range (4.0- 4.5) mm in length w
... Show MoreThe current research discussed biophysics data as a theoretical and applied knowledge base linking industrial design with the natural sciences at the level of applied strategies through which we can enrich the knowledge base of industrial design. The research focused on two main aspects of the scientific references for biophysics, namely: electromagnetism, and biomechanics. According to the performance and functional applications in designing the functions of industrial products at the electromagnetic level, it was found that remote sensing applications: such as fire sensors that were adopted from the insect (Black Beetle) and that their metaphors enable them to hear fire, and collision sensors, which were adopted from the insect
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show MoreThe data presented in this paper are related to the research article entitled “Novel dichloro(bis{2-[1-(4-methylphenyl)-1H-1,2,3-triazol-4-yl-κN3 ]pyridine-κN})metal(II) coordination compounds of seven transition metals (Mn, Fe, Co, Ni, Cu, Zn and Cd)” (Conradie et al., 2018) [1]. This paper presents characterization and structural data of the 2-(1-(4-methyl-phenyl)-1H-1,2,3-triazol-1-yl)pyridine ligand (L2 ) (Tawfiq et al., 2014) [2] as well as seven dichloro(bis{2- [1-(4-methylphenyl)-1H-1,2,3-triazol-4-yl-κN3 ]pyridine-κN})metal (II) coordination compounds, [M(L2 )2Cl2], all containing the same ligand but coordinated to different metal ions. The data illustrate the shift in IR, UV/VIS, and NMR (for diamagnetic complexes) peaks wh
... Show MoreA band rationing method is applied to calculate the salinity index (SI) and Normalized Multi-Band Drought Index (NMDI) as pre-processing to take Agriculture decision in these areas is presented. To separate the land from other features that exist in the scene, the classical classification method (Maximum likelihood classification) is used by classified the study area to multi classes (Healthy vegetation (HV), Grasslands (GL), Water (W), Urban (U), Bare Soil (BS)). A Landsat 8 satellite image of an area in the south of Iraq are used, where the land cover is classified according to indicator ranges for each (SI) and (NMDI).