In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
In this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.
A method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results hav
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThe research aimed to identify the level of job security, the level of sports institutional performance, and the relationship, contribution and impact of job security to sports institutional performance from the point of view of workers in the Iraqi Ministry of Youth and Sports. The descriptive approach was adopted in the manner of correlational relationships on a sample of (400) individuals who were randomly selected by (33.333%) of the employees working in the institutions at the headquarters of the Ministry of Youth and Sports, amounting to a total of (2293) individuals for the sports season (2022-2023), and they are naturally distributed among (13) main institutions in the formations of the headquarters of this ministry, and after adopt
... Show MoreAbstract
All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t
... Show MoreSchiff bases were prepared prepared Baaan NMR to some elements of which have contributed to the results of different methods in diagnosis prove structural formulas of compounds prepared
Objective(s): To determine the prevalence and predisposing factors of psychology & personality types among
infertile and fertile women attending in Complex Imam Khomeini Hospital.
Methodology: A total of 150 infertile women from Vali-Asr Reproduction Health Research Center and 150 fertile
women from the Gynecology Clinic of Imam Khomeini Hospital in Tehran / Iran were chosen by simple
randomization. Data was obtained by using Eysenck personality (EPQ) and structured researcher questionnaires.
Results: showed that based on Eysenck personality questionnaire (EPQ), personality instability was more common
among infertile women than fertile women; this relationship was statistically significant (P<0.001). Housewives
This study attempts to focus on there lation ship between employment policies andsocietal changesinIraq.Theconstruction ofoperational policyincommunitiesin crisis remains fraught with challenges and risks, especially in countries that have longoutstanding conflict sand crises, it is important in this context to achieve those policy and build the foundations of human security and poverty alleviation, unemployment, to find effective ways to help the community to achieve stability and reduce the risk of renew edorrepeat the cycleofviolence-butthatwouldrequirearadicalrethinking, including rethinking the way evaluating therisksandchallengesand management.And thatsuchaprojectshouldbe based ona clear roadmap, andthevisionsofdevelopmentanda clea
... Show MoreThis study try to discovering continuity in heritage, from its engaged with emotional side, the core of study is Islamic architectural, these architectural result still estate with time, due to role of it with Islam law, importance of continuity from finding real things of essential architects result The research reaching to concept of thoughtstaying, for Islamic heritage, as basic factor in continuity process by it is architecture. The mostly searches seeing imitation of figures as recently events, or as final result to stage conditions state, but we must remember the Islamic thinking as base stone to architecture results
.