Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Serum prolactin, Preptin, CCL 18 and genetic polymorphisms in Iraqi women with polycystic ovary syndrome
...Show More Authors

The polycystic ovary syndrome is an endocrine condition. One of the leading causes of female infertility and the most common disorder among women. The work was being carried out on 100 Iraqi women (50 cases confirmed with PCOS and 50 controls). Between October 2019 and March 2020, blood samples were collected from the Advanced Institute of Infertility Diagnosis and Assisted Reproductive Technology at AL-Nahrain University and a private laboratory. ELISA was used to evaluate the biochemical parameters of preptin, FSH, insulin, LH, and CCL 18 in serum samples from the AFIAS-6 (AFIAS Automated Immunoassay System). The findings of the analysis indicate that, as opposed to the control group, values of prolactin (ng/ml), LH (mIU/ml), Preptin (

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 14 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the Internal Audit Department in detecting corruption through accountability
...Show More Authors

Internal Audit  is one of the most important backers of corporate governance, the researcher expanded his interest in this subject to examine the efficiency of Internal Auditors at the Arab Bank and its branches in Jordan to achieve Accountability which enhances the Corporate Governance and to identify the effect of the International Internal Audit  Standards in strengthening the role of Internal Auditors in Accountability, and the effect of Attribute and Performance Standards in Accountability. The researcher applied descriptive analysis method to define the role of Internal Audit in the Arab Bank in achieving one of the basic principles of Corporate Governance assimilated in Accountability. The researcher’s sources include

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Red Monkey Optimization and Genetic Algorithm to Solving Berth Allocation Problems
...Show More Authors

In the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Numerical Modeling of Water Movement from Buried Vertical Ceramic Pipes through Coarse Soils
...Show More Authors

Problem of water scarcity is becoming common in many parts of the world.  Thus to overcome this problem proper management of water and an efficient irrigation systems are needed.  Irrigation with buried vertical ceramic pipe is known as a very effective in management of irrigation water.  The two- dimensional transient flow of water from a buried vertical ceramic pipe through homogenous porous media is simulated numerically using the software HYDRUS/2D to predict empirical formulas that describe the predicted results accurately.   Different values of pipe lengths and hydraulic conductivity were selected.  In addition, different values of initial volumetric soil water content were assumed in this simulation a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Learning English through Scaffolded Assistance in Iraqi EFL Classroom
...Show More Authors

Learning a foreign language is a highly interactive process, and a belief that communicative activities foster a great amount of linguistic production provides language practice and opportunities for negotiation of meaning during communicative exchanges. Thus, this study examines what benefits learner-centered classroom setting offers compared with that of teacher–centered classroom, and how less proficient learners accomplish their tasks and activities with scaffolded help during interaction with the help of proficient classmates and under the guidance of a skilful person, i.e., the teacher. The subjects participating in this study are 30 Iraqi 4th year college students in the Department of English, College of Arts , Univer

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2008
Journal Name
2008 First International Conference On The Applications Of Digital Information And Web Technologies (icadiwt)
Hybrid canonical genetic algorithm and steepest descent algorithm for optimizing likelihood estimators of ARMA (1, 1) model
...Show More Authors

This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
A critical reading of the artworks of Saudi artists through the theory of Erwin Panofsky
...Show More Authors

This study deals with the subject of art criticism by using Erwin Panofsky's theory to analyze a few Saudi artists' works. The study aims to identify Panofsky's theory and provide criticism of some Saudi artworks using it. The importance of the study is that it enriches the field of art criticism in the Kingdom of Saudi Arabia and helps critics and artists in using Panofsky’s theory to analyze artworks.
The study sample consists of six artworks produced in 2021 by six contemporary Saudi artists. In the theoretical section, the study dealt with several topics; first, is art criticism, the second part presents Panofsky’s theory with its three stages, the final part deals with the beginning of Saudi art until present time and its

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref