Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreBackground: Anti-oxidants are used as supplements to counteract the over production of free radicals in periodontal disease.Co-Q10 functions as an intercellular antioxidant by acting as a primary scavenger of free radicals (FRs) and reactive oxygen species (ROS), this study aimed to evaluate the effect of intra pocket application of perio Q gel (coenzyme Q10) alone and as adjunct to scaling and root planing on the periodontal clinical parameters in the treatment of patients with chronic periodontitis and compare the better improvement on the clinical periodontal parameters among different treatment modalities at 3 and 6 weeks. Materials and methods: A total of 323 sites with pocket depth (5-8) mm in patients with chronic periodontitis were
... Show MorePorosity and permeability are the most difficult properties to determine in subsurface reservoir characterization. The difficulty of estimating them arising from the fact that porosity and permeability may vary significantly over the reservoir volume, and can only be sampled at well location. Secondly, the porosity values are commonly evaluated from the well log data, which are usually available from most wells in the reservoir, but permeability values, which are generally determined from core analysis, are not usually available. The aim of this study is: First, to develop correlations between the core and the well log data which can be used to estimate permeability in uncored wells, these correlations enable to estimate reservoir permeabil
... Show MoreIn this paper, we propose a method using continuous wavelets to study the multivariate fractional Brownian motion through the deviations of the transformed random process to find an efficient estimate of Hurst exponent using eigenvalue regression of the covariance matrix. The results of simulations experiments shown that the performance of the proposed estimator was efficient in bias but the variance get increase as signal change from short to long memory the MASE increase relatively. The estimation process was made by calculating the eigenvalues for the variance-covariance matrix of Meyer’s continuous wavelet details coefficients.
A new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreIn this paper, we propose a method using continuous wavelets to study the multivariate fractional Brownian motion through the deviations of the transformed random process to find an efficient estimate of Hurst exponent using eigenvalue regression of the covariance matrix. The results of simulations experiments shown that the performance of the proposed estimator was efficient in bias but the variance get increase as signal change from short to long memory the MASE increase relatively. The estimation process was made by calculating the eigenvalues for the variance-covariance matrix of Meyer’s continuous wavelet details coefficients.
The estimation of the amounts of Surface runoff resulting from rainfall in the water basins is of great importance in water resources management. The study area (Bahr Al-Najaf) is located on the western edge of the plateau and the southwestern part of the city center of Najaf, with an area of 2729.4 (km2). The soil and water assessment tool (SWAT) with ArcGIS software was used to simulate the runoff coming from the three main valleys (Kharr (A and B)), Shoaib Al-Rahimawi, and Maleh), that contribute the flow to the study area. The results of the model showed that the SWAT software was successfully simulating the flow conditions based on the coefficient of determination (R2), the Nash coefficient (NS
... Show More