In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Problem Statement: Despite the critical role of arm movement in freestyle swimming, many learners— specially female students at Baghdad University's College of Physical Education and Sport Sciences— face difficulties executing the pushing phase of the stroke correctly. This phase essential for generating propulsion and maintaining body coordination in water. Traditional teaching methods lack immediate feedback on the quality and force of arm movements, impeding effective motor learning and coordination. Approach: the researchers developed a custom-made device designed to measure the pressure force exerted by the palms during freestyle swimming. The device features pressure sensors attached both hands, a processor that analyzes the colle
... Show Moreنقدم في هذا البحث تحليل لعملين أدبيين من منظور الحركات الطليعية ثبتت آثارها لدى بعض الكتاب العرب و أمريكا اللاتينية في فترة سنوات العشرينات والألفين. كانت الحياة الخاصة للكاتب ميغيل انخل استورياس تلهمه أنتاج أعمال أدبية، اذ شغل منصب دبلوماسي وحصل على جائزة نوبل غواتيمالاكا. ولد وتوفى في مدينة غواتيملاكا (1974- 1899) يوجد تحول واضح في عمله ذات الشهرة السيد الرئيس(1948) الذي يكسر المعتاد، لأجل مست
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreHealth and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreMigration today is a global problem and is an extraordinary social phenomenon that affects countries around the world. Globalization, demographic shifts, political persecution, wars, armed conflicts, natural and environmental disasters, lack of skills, employment and other reasons in many countries have accelerated global migration rates. It has been observed in recent years that there is a rapid feminization of all forms and stages of migration. Women now make up nearly half of the migrant population around the world, and it appears that women have their own motives for migration in addition to family reunification in escaping Gender discrimination, political violence, and social independence, economic motives and the desire for better opp
... Show MoreThe problem of generated waste as a result of the implementation of construction projects, has been aggravated recently because of construction activity experienced by the world, especially Iraq, which is going through a period of reconstruction, where construction waste represents (20-40%) of the total generated waste and has a negative effect on the environment and economic side of the project. In addition, the rate of consumpted amounts of natural resources are estimated to be about 40% in the construction industry, so it became necessary to reduce waste and to be manage well. This study aims to identify the key factors affecting waste management through the various phases of the project, and this is accom
... Show MorePlacental dysfunction and or fetal central nervous system infestation caused by Human cytomegalovirus (HCMV) is the leading cause of congenital non-genetic neuro-developmental problems of the newborn, worldwide. Although the highest rates of congenital infection and CMV seroprevalence occurs in developing countries like Iraq, there remains a paucity of data from that part of the world. This descriptive case control study was undertaken in Babylon/ Iraq to determine the local seroprevalence of CMV in women of child bearing age, and to identify the socio-demographic factors associated with it. This study found a seropositivity peak amongst the 26-35 yr olds which declined in the 36 – 45 yr olds. However, the
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreSuperconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th
six specimens of the Hg0.5Pb0.5Ba2Ca2Cu3-y