In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Let be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space
Today, Unmanned Aerial Vehicles (UAVs) or Drones are a valuable source of data on inspection, surveillance, mapping and 3D modelling matters. Drones can be considered as the new alternative of classic manned aerial photography due to their low cost and high spatial resolution. In this study, drones were used to study archaeological sites. The archaeological Nineveh site, which is a very famous site located in heart of the city of Mosul, in northern Iraq, was chosen. This site was the largest capital of the Assyrian Empire 3000 years ago. The site contains an external wall that includes many gates, most of which were destroyed when Daesh occupied the city in 2014. The local population of the city of Mosul has also large
... Show MorePerformance measurement is considered one of the most important issues in
Measuring performance effectiveness in the educational institutions by maintaining balance among quantity measurable factors. They can be financial or non‐financial factors. Consequently they reflect decisive factors in the success of educational institutions and determining suitable standards and dimensions for their activities and giving it proportional importance. Adopting the idea of Balanced Score Card as one of the modern administrative techniques and methods by educational institutions assists in the development of administrative work, adjusting the performance in addition to achieving comprehensive standard and development of educational universit
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreBarhi dates fruit are one of the most important date palm cultivars which are some of their properties they are mostly eaten and sold at the khalal stage when it has become yellow compared with rutab stage. At this stage the fruit loses its astringency and becomes sweet and best texture, therefore. High moisture content and rapid ripening of Barhi dates shorten their shelf life, as well the Khalal stage lasts for about 4 weeks until the ripening of the fruits begins and transfer to rutab stage. In the present study, Barhi dates packaging in the first by common air - packaging and
second by Modified atmosphere packaging, MAP A (5% O2 + 20% CO2) and MAP B (40%O2+20%CO2) and stored for 30 days at different temperatures 5 and 20 °C, re
Waveform flow of non-Newtonian fluid through a porous medium of the non-symmetric sloping canal under the effect of rotation and magnetic force, which has applied by the inclined way, have studied analytically and computed numerically. Slip boundary conditions on velocity distribution and stream function are used. We have taken the influence of heat and mass transfer in the consideration in our study. We carried out the mathematical model by using the presumption of low Reynolds number and small wave number. The resulting equations of motion, which are representing by the velocity profile and stream function distribution, solved by using the method of a domain decomposition analysis a
The introduction of the research on the science of training and the physiology of sports was addressed from important sciences, where the physical effort drew the attention of scientists since the past centuries when they studied how the body performs its functions when performing physical exertion and observe the changes that occur in it and write down and study especially the positive effects of the practice of daily sports The aim of the study was to investigate the effect of plank exercises on the lipid component and the metabolic rate (bmr) of the female students of the Higher Institute for Security and Management Development. As for the third chapter, the two researchers used the experimental method on a sample of the female s
... Show MoreInvestigation of geotechnical vulnerability (liquefaction) and Zonation of the southern region of the Caspian Sea is my most important aim in terms of destructive earthquakes hazard potential. Past geologic events on the south coast of Caspian Sea indicates that destructive earthquakes lead to the death of numbers in this area. Remained evidence of seismic events happening indicates extensive landslides, liquefaction and soil subsidence in the residential and even natural area. Therefore, in this study determination of geotechnical vulnerability (liquefaction) intensity in southern coast of Caspian Sea against natural forces resulting from earthquakes and coastal construction via geographical information system e
... Show MoreThe increasing amount of educational data has rapidly in the latest few years. The Educational Data Mining (EDM) techniques are utilized to detect the valuable pattern so that improves the educational process and to obtain high performance of all educational elements. The proposed work contains three stages: preprocessing, features selection, and an active classification stage. The dataset was collected using EDM that had a lack in the label data, it contained 2050 records collected by using questionnaires and by using the students’ academic records. There are twenty-five features that were combined from the following five factors: (curriculum, teacher, student, the environment of education, and the family). Active learning ha
... Show MoreUnconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria. Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core. Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um
... Show More