In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
Organophosphorus insecticide and growth regulator namely Ethephon (2-chloroethylphosphonic acid) are widely used as a ripening process accelerator and a cultivation duration inhibitor. Pomegranate extract (PPE) has recently been taken into consideration due to its pharmacological effects especially those associated with renal diseases. Thus, this study aims to investigate the possible protective effect of PPE against ethephon-induced nephrotoxicity in rats. In this study four groups of adult male rats were divided into control group, PPE 400 mg/kg group, Ethephon 250 mg/kg group, and finally, PPE + Ethephon group (treated with the same dose of PPE group and Ethephon group). In the current study, kidney function parameters (KIM-1, creatin
... Show MoreThis research paper which is entitled “Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky” deals with the forms of verbs (i.e., kinds of tenses and suffix analysis). It is one of the applied studies. Verbs are basic elements in Turkish sentences. Their function is to state the predicate which is a sentential essential part. Verbs denote sentence construction, action and formal aspects. Forms are added to the base of verbs in the Turkish language giving the verbs their final structures. Such structures are set in a distinct planned way. The verbs used in the Turkish language which are distinguished by one of these forms are known as simple tense verbs.
Sait Faik'in ( "Havada Bulut" adlı Hikayesinde Fi
... Show Moreيعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد
... Show MoreElectronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreThe Dictionary of Countries by Yaqut al-Hamawi is one of the most important sources that researchers rely on in everything related to geography in knowing the names of places and countries, and the important historical information it contains about different cities and countries
The Dictionary of Countries by Yaqut al-Hamawi is one of the most important sources that researchers rely on in everything related to geography in knowing the names of places and countries, and the important historical information it contains about different cities and countries
The research aims to improve operational performance through the application of the Holonic Manufacturing System (HMS) in the rubber products factory in Najaf. The problem was diagnosed with the weakness of the manufacturing system in the factory to meet customers' demands on time within the available resources of machines and workers, which led to time delays of Processing and delivery, increased costs, and reduced flexibility in the factory, A case study methodology used to identify the reality of the manufacturing system and the actual operational performance in the factory. The simulation was used to represent the proposed (HMS) by using (Excel 2010) based on the actual data and calculate the operational performance measures
... Show MoreOne of them one of the important books due to its containing valuable information written by the author. Information include the life of the Messenger (Peace be upon him)