Preferred Language
Articles
/
bsj-7281
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Meta Gene
Interleukin-2 serum level, genetic polymorphism (rs2069763), anti-rubella antibody and risk of multiple sclerosis among Iraqi patients
...Show More Authors

Background: Multiple sclerosis (MS) is a chronic neurodegenerative autoimmune disease mediated by autoreactive T cells against myelin-basic proteins. Cytokines are suggested to play a role in the etiopathogenesis of the disease. Among these cytokines is interleukin-2 (IL-2). Aim of the study: To investigate the association between IL2+166 G/T single nucleotide polymorphism (SNP: rs2069763) and MS in Iraqi patients. Serum level of IL-2 was also detected. Anti-rubella IgG antibody was further determined in the sera of patients. Patients and methods: Eighty MS patients (28 males and 52 females; age mean ± SD: 39.2 ± 16.1 years) and 80 healthy control matched patients for age (32.15 ± 16.13 years) and gender (28 males and 52 females) were en

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Gene Reports
Vitamin D receptor rs2228570 and rs1544410 genetic polymorphisms frequency in Iraqi thalassemia patients compared to other ethnic populations
...Show More Authors

Background: The genetic polymorphisms of vitamin D receptor (VDR) have an association with thalassemia development, additionally to the environmental elements that elicited the disorder in the genetically predisposed individuals. As well, VDR functions responsible for the regulation of bone metabolism, such its part in immunity. Aim: The sitting study intended to inspect the association between thalassemia disease and the genetic polymorphisms of VDR among the Iraqi population then compared these findings to other findings of thalassemia patients in other different ethnic populations. Materials and methods: The restriction enzymes Bsm-I and Fok-I were applied to determine the genetic polymorphisms frequencies of VDR by a Polymerase Chain Re

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
The Relation between Some Genetic Traits (Ptc Tasting, Tongue Rolling, Earlobe Attachment and Dental Occlusion in Iraqi Adults
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Natural Sciences Research
Genetic Study for G-Protein Coupled Receptor from Saccharomyces Cerervisiae and From Sera of Patients with Heart Thrombosis
...Show More Authors

Aim of the present study is Identification of specific gene for GPCR using specific primers .and identification of difference in PCR analysis in patients with heart thrombosis and compared with healthy, Sequencing of PCR product regarding GPCR compared for all three subject, Identification the similarity of human GPCR with local strain of yeast fifty healthy control and fifty patients with thrombosis which diagnosed medically with cardiac specific troponin t, troponin 1 levels and electro myocardiogram ECG. The aged for all subjects ranged (39-75) years patients were lying in cardiac care unit at Ibn- al- Nafees teaching hospital and Sheikh Zayed teaching hospital. Genomic DNA of whole blood was extracted from buffy coat and cell cu

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Performance Evaluation of Al-Karkh Water Treatment Plant Using Model-driven and Data-Driven Models
...Show More Authors
Abstract<p>There is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn</p> ... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 08 2026
Journal Name
Al–bahith Al–a'alami
Tweets of Iraqi Political Leaders Regarding The Movement to Form The Governmet Through Twitter (From 3rd Septemper 2018 To 3rd Septemper 2019)
...Show More Authors

This research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 24 2024
Journal Name
Applied Water Science
Tectonic activation and the risk of Ilisu Dam collapse to Iraq through modelling and simulation using HEC-RAS
...Show More Authors
Abstract<p>Floods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.</p><p>The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF