In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show MoreJurisprudence is one of the most honorable sciences in value, and the greatest of them in reward. Through it, the rulings of religion are known. He, may God’s prayers and peace be upon him, said: ((Whoever God desires good, He gives him understanding of religion)), and through it, the legal rulings and what is related to them are known from what is permissible and forbidden.
And prayer is the believer’s ascent to his Lord, with which the heart is at peace and the soul is at ease. If he, may God’s prayers and peace be upon him, was overwhelmed by an issue or something became difficult for him, he would panic in prayer and be reassured by it. It was necessary for the students of knowledge to investigate its aspects and its secrets
تم الحصول على 4 عزلات من بكتريا Bacillus sp ودرست قدرتها على انتاج الكايتنيز حيث اظهرت نتائج الغربلة الكمية ان العزلة Bacillu sp A3 هي الاغزر انتاجا وبلغت الفعالية النوعية 3.8وحده/ملغم بروتين.
يعود الأرشيف إلى تورام ايلي التاجر والذي عرف في النصوص أيضا بوكيل التجار(ugula-dam-gàr)، في دوره هذا له سلطة بين التجار في مجتمعه(مجتمع التجار)، يذكر(Garfinkle) أن التجار غالبا ما اكتسبوا ألقابهم عن طريق الوراثة ذلك قد يمنح التجار حق الدخول إلى حسابات المؤسسات العامة. كان تورام ايلي تاجرا نشيطا في أعمال قروض الفضة في أواخر عهود سلالة أور الثالثة(3)، لمدة (ثمان عشرة) سنة أعتبارا من السنة الرابعة من حكم الملك أمارسن وحتى ا
... Show MoreThe research tries to discuss the European attitude towards the Iranian nuclear
activities withen its ambitious nuclear program. It studies the European endeavor to settle
this problem peacefully or to solve it by exerting economic and diplomatic pressures on the
Iranian leadership so, it will give up its nuclear ambitions.
Germany exerts single efforts and others withen the European Troika to follow up
the Iranian nuclear case attempting to prevent Iran from acquiring nuclear weapon which
gives Iran a distinguished regional status. Thus , this situation will lead the current regional
equivalence become unbalanced as well as it is conducive to dangerous consequences , to
endanger the security of Israel is the most
Produced ancient Iraqi civilization among the ingredients of civilization as a result of
human interaction with the environment in which they live , and began this ingredient in a
simple and took vary and evolve with the evolution of human life itself.
And passing epoch long time occupied by this civilization in the land of Mesopotamia,
which reflected the legibility Althelol archaeological scattered in most parts of this land
emerged features of this civilization has been able shovels prospectors that secreted into the
essence of knowledge to the archaeological researcher and specialist process of analysis and
extrapolation of all information contained and provided by the missions excavation which
began in archae
Of non-Muslim minorities In the Muslim community
Media is one of the main and effective factors; and it is a tool of crisis management equipment. Media is one of the most dangerous, effective and decisive weapons in modern conflicts; a tool for making events and influencing their events and trends as a means of reporting as the enormous capabilities of media which help media to move very quickly, and cross borders; and overcome obstacles, through many means of audio, reading and visual. As its ability, moreover, to influence the psychological and intellectual control of communities, and behaviors.
Intelligent media is, then, used in crises management and coverage. Crises have been existed with the presence of man on Earth. Thei
... Show MoreThe research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.
This paper presents the application of a framework of fast and efficient compressive sampling based on the concept of random sampling of sparse Audio signal. It provides four important features. (i) It is universal with a variety of sparse signals. (ii) The number of measurements required for exact reconstruction is nearly optimal and much less then the sampling frequency and below the Nyquist frequency. (iii) It has very low complexity and fast computation. (iv) It is developed on the provable mathematical model from which we are able to quantify trade-offs among streaming capability, computation/memory requirement and quality of reconstruction of the audio signal. Compressed sensing CS is an attractive compression scheme due to its uni
... Show More