In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The research aims to measure, assess and evaluate the efficiency of the directorates of Anbar Municipalities by using the Data Envelopment Analysis method (DEA). This is because the municipality sector is consider an important sector and has a direct contact with the citizen’s life. Provides essential services to citizens. The researcher used a case study method, and the sources of information collection based on data were monthly reports, the research population is represented by the Directorate of Anbar Municipalities, and the research sample consists of 7 municipalities which are different in terms of category and size of different types. The most important conclusion reached by the research is that there is a variation in the efficien
... Show MoreThis research takes up address the practical side by taking case studies for construction projects that include the various Iraqi governorates, as it includes conducting a field survey to identify the impact of parametric costs on construction projects and compare them with what was reached during the analysis and the extent of their validity and accuracy, as well as adopting the approach of personal interviews to know the reality of the state of construction projects. The results showed, after comparing field data and its measurement in construction projects for the sectors (public and private), the correlation between the expected and actual cost change was (97.8%), and this means that the data can be adopted in the re
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of
... Show MoreThe study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5
... Show MoreDesign sampling plan was and still one of most importance subjects because it give lowest cost comparing with others, time live statistical distribution should be known to give best estimators for parameters of sampling plan and get best sampling plan.
Research dell with design sampling plan when live time distribution follow Logistic distribution with () as location and shape parameters, using these information can help us getting (number of groups, sample size) associated with reject or accept the Lot
Experimental results for simulated data shows the least number of groups and sample size needs to reject or accept the Lot with certain probability of
... Show MoreThis paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.
The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha
... Show MoreThe study aims to study the geographical distribution of electricpower plants in Iraq, except the governorates of Kurdistan Region (Dohuk, Erbil, Sulaymaniyah) due to lack of data.
In order to reach the goal of the research was based on some mathematical equations and statistical methods to determine how the geographical distribution of these stations (gas, hydropower, steam, diesel) within the provinces and the concentration of them as well as the possibility of the classification of power plants in Iraq to facilitate understanding of distribution in a scientific manner is characterized by objectively.
The most important results of the research are that there are a number of factors that led to the irregular distribution
... Show MoreThe -multiple mixing ratios of γ-transitions from levels of populated in the are calculated in the present work by using the a2-ratio methods. We used the experimental coefficient (a2) for two γ-transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions. This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa. The weight average of the -values calcu
... Show More