In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Abstract
The study aims to find out the degree of practicing professional leadership of the faculty’s deans, deputies, and heads of the scientific divisions at Al-Qaseem University. The study has adopted the descriptive analytical method. To achieve the objective of the study, the researcher developed a questionnaire consisting of (45) items distributed to six fields that were applied to a sample of (116) faculty deans, deputies, and the head of division at Al-Qaseem University. The results showed there is a high practicing degree of the study sample individuals of the professional leadership on the questionnaire’s fields as a whole, strategic thinking field came at the first rank, while the innovation, creat
... Show MoreIn this work we study the influence of the laser pulse energy and ablation time on the aluminum nanoparticles productivity during nanosecond laser ablation of bulk aluminum immersed in liquid.
Aluminum nanoparticles were synthesized by pulsed laser ablation of Al targets in ethanol for 3-8 minutes using the 1064 nm wavelength of a Nd:YAG laser with energies of 300-500 mJ per pulse.The laser energy was varied between 300 and 500 mJ/pulse, whereas the ablation time was set to 5 minutes. UV-Visible absorption spectra was used for the characterization and comparison of products.
The simulation have been made for 3D flow structure and heat transfer with and without
longitudinal riblet upstream of leading edge vane endwall junction of first stage nozzle guide vane .The research explores concept of weakening the secondary flows and reducing their harmful effects.Numerical investigation involved examination of the secondary flows ,velocity and heat transfer rates by solving the governing equations (continuity, Navier -stokes and energy equations ) using the known package FLUENT version (12.1).The governing equations were solved for three dimentional, turbulent flowe, incompressible with an appropriate turbulent model (k-ω,SST) .The numerical solution was carried out for 25 mode
... Show MoreAbstract: This study aims to investigate the backscattering electron coefficient for SixGe1-x/Si heterostructure sample as a function of primary electron beam energy (0.25-20 keV) and Ge concentration in the alloy. The results obtained have several characteristics that are as follows: the first one is that the intensity of the backscattered signal above the alloy is mainly related to the average atomic number of the SixGe1-x alloy. The second feature is that the backscattering electron coefficient line scan shows a constant value above each layer at low primary electron energies below 5 keV. However, at 5 keV and above, a peak and a dip appeared on the line scan above Si-Ge alloy and Si, respectively, close to the interfacing line
... Show MoreThe compound [K1] was synthesized from the reaction of dichloromethane with linear alkyl benzene (Lab9) using ethanol as a solvent, and from(chloro methyl)-4-nonylbenzene) [K1] it was possible to synthesize the compound Z(4-(nonan-3-yl)phenyl) methane amine) [K2] containing the amine group by synthesized from [K2] reaction with appropriate phenolic aldehydes and using Ethanol as a solvent in the preparation of vinyl chloride4-(((4-nonylbenzyl)imino)methyl)phenol-4-(((4-nonylbenzyl)imino methyl)benzene-1,3diol) [K3-K4] bases has been used. Preparation of a number of Phenolic polymers4-(2- hydroxy-3.5-dimethylbenzyl)-2-methyl-6-(((4-4-(2hyroxy-3, 5-dimethylbenzyl)-2-methyl-6(((4 nonylbenzyl) imino) methyl) benzene-phenolnonylbenzyl) imino) me
... Show MoreBACKGROUND: The degree of the development of coronary collaterals is long considered an alternate–that is, a collateral–source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty.