In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
This work revealed the spherical aromaticity of some inorganic E4 cages and their protonated E4H+ ions (E=N, P, As, Sb, and Bi). For this purpose, we employed several evaluations like (0D-1D) nucleus independent chemical shift (NICS), multidimensional (2D-3D) off-nucleus isotropic shielding σiso(r), and natural bond orbital (NBO) analysis. The magnetic calculations involved gauge-including atomic orbitals (GIAO) with two density functionals B3LYP and WB97XD, and basis sets of Jorge-ATZP, 6-311+G(d,p), and Lanl2DZp. The Jorge-ATZP basis set showed the best consistency. Our findings disclosed non-classical aromatic characters in the above molecules, which decreased from N to Bi cages. Also, the results showed more aromaticity in E4 than E4H+
... Show MoreAn optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination
... Show MoreAsthma is a condition characterized by bronchial spasms, inflammation, and mucous hypersecretion which leads to difficulties in respiration. Asthmatic patients are usually presented with recurrent attacks of coughing, wheezing, and shortness of breath which could be life-threatening. More than three million cases of asthma in the United States are diagnosed annually. Resveratrol, a polyphenolic stilbene, is known to be useful in controlling asthmatic attacks via different molecular mechanisms within the lung epithelium and infiltrating immune cells. However, few studies mentioned the effect of resveratrol on the microbiome in ovalbumin-induced asthma mouse model. In this study, we ind
In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-
... Show MoreAbstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.
Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t
... Show MoreThe research aims at a statement Internal Debt options during shocks and the impact of this borrowing in the volume of the foreign reserve, using induction and deduction with available data analysis. During the period (2004-2013) did not require the use of borrowing across (financial institutions, discounted transfers, bonds); it was only sufficient by transfer with commercial banks that can finance of temporary budget deficits: rose and decline of volume of foreign reserve according to the changes of oil prices and the volume of purchases and sales of the Central Bank of Iraq. Central Bank of Iraq (CBI) has significantly contributed to Internal Debt through bond and discounted transfers in the secondary market; thus, funding the
... Show More
When the financial resources of individuals and groups available, this will lead to increase the consumption ranges and sometimes reached to excessive especially to the categories that have little awareness about economic importance and its reflections. it seems that consumerism has increased in many countries including Iraq because of many factors, and the most important one is the availability of financial resources as a result of the increase in oil exports as well as the spread of consumption media department at various levels especially.
conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
Root-finding is an oldest classical problem, which is still an important research topic, due to its impact on computational algebra and geometry. In communications systems, when the impulse response of the channel is minimum phase the state of equalization algorithm is reduced and the spectral efficiency will improved. To make the channel impulse response minimum phase the prefilter which is called minimum phase filter is used, the adaptation of the minimum phase filter need root finding algorithm. In this paper, the VHDL implementation of the root finding algorithm introduced by Clark and Hau is introduced.
VHDL program is used in the work, to find the roots of two channels and make them minimum phase, the obtained output results are