Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Independent Thermal Network Through Thermal Synergy Between Four Architectural Units
...Show More Authors

The manifestations of climate change are increasing with the days: sudden rains and floods, lakes that evaporate, rivers that experience unprecedentedly low water levels, and successive droughts such as the Tigris, Euphrates, Rhine, and Lape rivers. At the same time, energy consumption is increasing, and there is no way to stop the warming of the Earth's atmosphere despite the many conferences and growing interest in environmental problems. An aspect that has not received sufficient attention is the tremendous heat produced by human activities. This work links four elements in the built environment that are known for their high energy consumption (houses, supermarkets, greenhouses, and asphalt roads) according t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Employing digital marketing through communication in promoting the commercial product
...Show More Authors

In recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
Function of Urban Space in strengthen social interaction through Time
...Show More Authors

problem of the research is the decline of the role of urban space with time as an influential system in societal relations. The research aims to define indicators for achieving social interaction in the city, and to determine indicators for achieving integration in the urban space, and to study the relationship between the integration of urban space and community interaction over time. the research assumed that by distinguishing the social interaction space from the urban space and developing urban spaces in order to be truly interactive spaces, this will help us achieve social interaction and build a positive relationship between them, which enables us to achieve integration within the urban spaces leading to social interaction. Because

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 02 2014
Journal Name
Sino Us
“Actual Experience”: Correcting Misconceptions Through Analyzing Harriet Wilson’s Our Nig
...Show More Authors

African-American writers during the 19th century wrote in the shadow of the prominent romance, sentimental, and domestic fiction. Harriet Wilson’s Our Nig (1859) reflects an “alternative social character”, for the female protagonist suffers racism in the free North, because she is a mulatto child. Through depicting the life of free blacks, who supposedly lives a better life than Southern slaves, Wilson exposes how she has actually lived and sensed life in antebellum America. According to Raymond Williams (2011), there are two kinds of literary writings. The first represents the general tendency of the age, and he calls it “dominant social character”; representing the majority content of both the public writing and speaking. But, a

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Aims Mathematics
Solving quaternion nonsymmetric algebraic Riccati equations through zeroing neural networks
...Show More Authors

<abstract><p>Many variations of the algebraic Riccati equation (ARE) have been used to study nonlinear system stability in the control domain in great detail. Taking the quaternion nonsymmetric ARE (QNARE) as a generalized version of ARE, the time-varying QNARE (TQNARE) is introduced. This brings us to the main objective of this work: finding the TQNARE solution. The zeroing neural network (ZNN) technique, which has demonstrated a high degree of effectiveness in handling time-varying problems, is used to do this. Specifically, the TQNARE can be solved using the high order ZNN (HZNN) design, which is a member of the family of ZNN models that correlate to hyperpower iterative techniques. As a result, a novel

... Show More
View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
System Identification Algorithm for Systems with Interval Coefficients
...Show More Authors

In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Nurse Scheduling Problem Using Hybrid Simulated Annealing Algorithm
...Show More Authors

Nurse scheduling problem is one of combinatorial optimization problems and it is one of NP-Hard problems which is difficult to be solved as optimal solution. In this paper, we had created an proposed algorithm which it is hybrid simulated annealing algorithm to solve nurse scheduling problem, developed the simulated annealing algorithm and Genetic algorithm. We can note that the proposed algorithm (Hybrid simulated Annealing Algorithm(GS-h)) is the best method among other methods which it is used in this paper because it satisfied minimum average of the total cost and maximum number of Solved , Best and Optimal problems. So we can note that the ratios of the optimal solution are 77% for the proposed algorithm(GS-h), 28.75% for Si

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 20 2012
Journal Name
International Journal Of Computer And Information Engineering
An Optimal Algorithm for HTML Page Building Process
...Show More Authors

An Optimal Algorithm for HTML Page Building Process

View Publication Preview PDF