Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Moslem women between west and Islam
...Show More Authors

The Moslem women between west and Islam ,This study deals with Muslim women
from the west Pont of view in the oriental studies or the western media and how it was
exposed to ill-treatment or evil-eyed by the west due to misunderstanding or it was done on
purpose that they didn’t comprehend how the women deals with Islam ,so this western view
assured that Islam had disparaged the women's position and hindered her freedom, aiming at
stabbing Islam and dislocate the Islamic tissue which is formed from man and women.
This study has established with evidences the distance of this western view from reality
Islam in fact raised and lifted women's position while the western women was living on
the margin of life, robbed

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
2016 International Conference On Computing, Networking And Communications (icnc)
Connectivity and rendezvous in distributed DSA networks
...Show More Authors

In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 06 2015
Journal Name
Journal Of Social Science Research
The Syntactic and Concurrent Aspects of Emphasizers
...Show More Authors

The reinforcing effect of emphasizers can hardly be denied, hence their importance , hence the justification for writing this paper. As a particular type of adverbials , emphasizers form part of a major syntactic class. This study, thus, introduces the topic by first discussing a grammatical category characterized by being mobile and optional. The paper duly shows the scaling effect of emphasizers, their kinds and the transformational selectional rules that are operative in moving them to the right or left of the VP. It also handles their syntactic role as modifiers, their syntactic features,their occurrence or non- occurrence with negation and imperative and the position they occupy in the sentence. The paper also dwells on the agr

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Antimutagenicity of arugula(Eruca sativa) and carrot
...Show More Authors

Been studying the opposite effect of mutagenesis to juice plant watercress and compared juice carrots to induce mutations resistant Struptomaysan Palmtafr (NTG) and transactions as diverse as the use of juice before treatment Palmtafr or after using Almtafr or with Almtafr using system mutagenesis Bactra consisting of three isolates G3, G12, G27 are very sensitive to Struptomaysanstudy resulted in a user juice plants had no effect on the neighborhood number of isolates, but its effect on the watercress was clear

View Publication Preview PDF
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Iraqi J Comm Med
Dermatofibrosarcoma Protuberans:" Epidemiological and Clinical Study
...Show More Authors

AA Al-Nuaimy, Iraqi J Comm Med, 2008 - Cited by 3

View Publication
Publication Date
Sat Oct 17 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
Line and continuum variability in active galaxies
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
On Monotonically T2-spaces and Monotonicallynormal spaces
...Show More Authors

In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.

View Publication Preview PDF
Crossref
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Child custody and protection In Islamic jurisprudence
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon our Master Muhammad and upon all his family and companions:
And then: What most concerns rational people and reformers in the modern era is the moral deviation and delinquency that dominates childhood, due to family disintegration and the lack of discipline of most societies according to the religious and moral motives called for by the heavenly messages, especially Islam, which is the final message and guarantees the reform of people in life. Every time and place.
Islam has drawn attention to this issue (childhood) and made it the focus of its consideration, considering that the child is the nucleus of society and the preparation for the future, so it ordered that

... Show More
View Publication Preview PDF