In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
To ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show MoreFullerene nanotube was synthesized in this research by pyrolysis of plastic waste Polypropylene (PP) at 1000 ° C for two hours in a closed reactor made from stainless steel using molybdenum oxide (MoO3) as a catalyst and nitrogen gas. The resultant carbon was purified and characterized by energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of C60 nanotubes were observed with the Field emission scanning electron microscopy (FESEM). The carbon is evenly spread and has the highest concentration from SEM-EDX characterization. The result of XRD and FESEM shows that C60 nanotubes are present in Nano figures, synthesized at 1000 ° C and with pyrolysis tempera
... Show MoreThe research included four topics: the definition of Imam al-Bazzazi, his scientific life, his sheikhs, his students, his writings, his death, and selected issues of his weight in the book of prayer. The Imam al-Bazazi is the son of Muhammad ibnShihabibn Yusuf. He is known as al-Khardizi al-Khawarizmi. The author did not adopt the definitions of language and terminology, and rarely mention the legal evidence adopted by the scholars in their opinions, and only to mention the views only, and the author, may God have mercy on him in his book on the sources of m The Prophet (peace and blessings of Allaah be upon him) said: "The Prophet (peace and blessings of Allaah be upon him) And fall down the order, the third issue, which is to leave the
... Show MoreThe Banking Supervision of the most important functions of the Central Bank of Iraq, which he intended to have a strong banking system and a sound and competitive, and exercised control over the banks by inspection bodies to ensure their compliance with the laws, regulations and orders and instructions and the safety of their financial positions.
The research was aimed to release the concept of banking inspection, compliance and problems and obstacles faced by the inspectors, and monitors compliance and down to make recommendations.
Has been reached on a set of theoretical and practical conclusions, including: -
1-confirmed the statistical analysis of the answers to the research sample the importance of the role o
... Show Moreتهدف الدراسة الحالية الى التعرف على مدى فاعلية استخدام اسعار اسهم الشركات العادية المتداولة في اسواق راس المال لقياس كفاءة الادارة المالية، وذلك بعد دراسة اهم العوامل المؤثرة على هذه الاسعار، بالاضافة الى محاولة اعطاء فكرة مختصرة عن مفهوم الاسهم العادية وبعض الامور المتعلقة بها، اما الجانب التطبيقي فقد تم اخذ اسعار الاسهم العادية لعينة من الشركات العراقية واجراء مقارنة بينها وبين القيمة الدفترية لها ومن
... Show MoreThe study aims to know the role of governance in the consolidation of the principles of business ethics, through the application of the principles of governance and the dimensions of business ethics in the private sector. And knowledge of the validity of the hypothesis key of the current study according to which "increases the ethics of business organizations strength and coherence in the presence of the principles of governance" as it was distributed the questionnaire to a sample of a chairman and board members and managers department and heads of sections in some of the private banks. I have been using correlation analysis and regression testing (t) to see the moral differences and to find out the c
... Show MoreQuality is the key to success in today's world, which is based mainly on competition in the provision of high quality services through the application of the modern management method which is called total quality management in organizations. This includes describing the provision of health services and satisfaction of patients . .  
... Show MoreÖzet
Sözlü Türk halk edebiyatı ürünleri içinde önemli yere sahip olan türlerden biri de atasözleridir. Atasözleri, nesilden nesile halk ağzında dolaĢan, kimin söylediği bilinmeyen, birtakım gerçekleri kısa ve öz bir Ģekilde ifade eden sözlerdir. Türk atasözleri Orhun Abideleri‟nde ilk kez karĢımıza çıkmakla birlikte, Uygur dönemi yazıtlarında ve özellikle Dîvânü Lûgati‟t Türk‟te geniĢ yer bulmuĢtur. Dilin anlatım ve kullanım imkânlarını geliĢtiren atasözlerine, dünyanın bütün dillerinde rastlanabilir. Bunun için, söyleyiĢte güzel, anlatımda güçlü, kavramda önemli unsurlar içeren kalıplaĢmıĢ sözler halinde bulunurlar. Bu çalıĢmada, Türk halk edebiyatında atas
Estimation stage is one of most important in process of selecting and identification for fit model, this model gives a best results if the good methods of estimation are depended on, one of those methods is Bayes method for estimation the parameters, it puts an assumption that parameter have a distribution.
This paper studies the robustness of estimators of empirical Bayes to know the properties of those estimators.
يهتم هذا البحث بتحضير وتشخيص ليكاند ثنائي السن -: [4-(5,5-dimethyl-3-oxocyclohex-1-enylamino)-N-(5-methylisoxazol-3-yl)benzene sulfonamide] [H2L] وذلك من صهر السلفاميثوكسازول مع الدايميدون بدرجة ºC)140 (ُ ولمدة نصف ساعة , حظر معقد الكوبالت مѧن تفاعѧل هѧذا الليكاند مع ايون الكوبالѧت الثنѧائي وبطريقѧة التصѧعيد الا ُ رجѧاعي باسѧتعمال الايثѧانول وسѧطا للتفاعѧل . شѧخص الليكانѧد والمعقѧد المحضر باستعمال الطرائق الطيفية التي اثبتت ان المعقد ذات شكل هندسѧي ر
... Show More