In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Around fifty isolates of Salmonella enterica serovar Typhi were isolated from blood specimens of patients referring to several hospitals in Kirkuk province, Iraq. The results revealed that all isolates developed resistance to trimethoprim-sulfamethoxazole and chloramphenicol. However, neither sul2 nor tem genes were detected. Moreover, only ten isolates were positive for catP. Our data suggested participation of other genes or mechanisms allow these multidrug isolates to resist the antibiotics in question.
This study was aimed to detect and identify genetic mutations in γ-aminobutyric acid receptor β3 subunit encoding gene (GABRB3) and its association with autism spectrum disorders. Forty autistic patients and 25 non-autistic as control group (5 unaffected sibling and 20 unrelated) with age range from 3 – 10 years were included in this study. Chromosomal DNA was extracted from blood samples followed by polymerase chain reaction (PCR) amplification of two targeted regions which include: (exon2-intron2-exon3) region and (exon 6) region of GABRB3 for subsequent DNA sequencing. Identical bands related to the targeted regions were present in all samples. A sample of PCR products of patients and controls were sequenced. Sequencing results re
... Show MoreData mining is a data analysis process using software to find certain patterns or rules in a large amount of data, which is expected to provide knowledge to support decisions. However, missing value in data mining often leads to a loss of information. The purpose of this study is to improve the performance of data classification with missing values, precisely and accurately. The test method is carried out using the Car Evaluation dataset from the UCI Machine Learning Repository. RStudio and RapidMiner tools were used for testing the algorithm. This study will result in a data analysis of the tested parameters to measure the performance of the algorithm. Using test variations: performance at C5.0, C4.5, and k-NN at 0% missi
... Show MoreThis paper includes the application of Queuing theory with of Particle swarm algorithm or is called (Intelligence swarm) to solve the problem of The queues and developed for General commission for taxes /branch Karkh center in the service stage of the Department of calculators composed of six employees , and it was chosen queuing model is a single-service channel M / M / 1 according to the nature of the circuit work mentioned above and it will be divided according to the letters system for each employee, and it was composed of data collection times (arrival time , service time, departure time)
... Show More
The drought is a globally phenomenon, its influence will convert large parts of Middle East and North Africa (MENA) region into hot dry deserts under the expectations of the climate change scenarios. Climate limitations, soil erosion affected by weather properties such as unequally and limited rainfall; temperature changing and wind, unsuitable irrigation techniques, excessive grazing, agricultural expansion against to the natural habitats, extensively clearance of natural vegetation, and soil salinity had all contributed to land degradation, reduced water supplies, and limited agricultural production in Iraq. It is estimated that nearly 54.3 % of Iraq's area is threatened by desertification problems.
In this research, for Iraq the Cl
The main objective of e-learning platforms is to offer a high quality instructing, training and educational services. This purpose would never be achieved without taking the students' motivation into consideration. Examining the voice, we can decide the emotional states of the learners after we apply the famous theory of psychologist SDT (Self Determination Theory). This article will investigate certain difficulties and challenges which face e-learner: the problem of leaving their courses and the student's isolation.
Utilizing Gussian blending model (GMM) so as to tackle and to solve the problems of classification, we can determine the learning abnormal status for e-learner. Our framework is going to increase the students’ moti
The problem of water scarcity is becoming common in many parts of the world, to overcome part of this problem proper management of water and an efficient irrigation system are needed. Irrigation with a buried vertical ceramic pipe is known as a very effective in the management of irrigation water. The two- dimensional transient flow of water from a buried vertical ceramic pipe through homogenous porous media is simulated numerically using the HYDRUS/2D software. Different values of pipe lengths and hydraulic conductivity were selected. In addition, different values of initial volumetric soil water content were assumed in this simulation as initial conditions. Different value
... Show MoreIn this paper, the effects of hematocrit of red blood cells on blood flow through a stenosed human carotid artery was considered by taking blood as a Newtonian fluid. The governing equations on blood flow were derived. The mathematical content involved in the equations are the variables of interest such as number of stenosis , percentage of hematocrit of red blood cells in the blood, flow rate, wall shear stress, and viscosity of the blood. Guided by medical data collected on the constraint of blood flow in stenosed human carotid arteries, the governing equations were used to check the effects of pressure gradient, wall shear stress, velocity, and volumetric flow rate of blood in the human carotid arteries. Also, the one-dimensiona
... Show MoreComputer-aided modeling and simulation software programs are essential tools
to predict how an optical communication component, link, or network will function
and perform. This paper aims to investigate the various effects on pulses
propagation in optical transmission systems utilizing the MATLAB program.
Dispersion and Attenuation effects are explored. The simulation of Gaussian pulses
propagation through single mode optical fiber, simplifies the design of optical
communication system and make the design process more efficient, less expensive,
and faster.