Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
Correlation and path coefficient analysis were worked out for ten morphological traits in 30 three-way crosses of maize. Phenotypic and genotypic correlation analysis indicated that ear length; row numbers per ear, grain numbers per row, leaf area and leaves numbers had a positive significant correlation with grain yield per plant. Further partitioning of correlation coefficients into direct and indirect effects showed that traits days to silking, row numbers per row and leaves numbers had a positive direct effect on grain yield per plant. The traits ear length, grain numbers per row and leaf area had a maximum total effect on grain yield. Furthermore, PCA analysis has gave interested
Robot manipulator is a multi-input multi-output system with high complex nonlinear dynamics, requiring an advanced controller in order to track a specific trajectory. In this work, forward and inverse kinematics are presented based on Denavit Hartenberg notation to convert the end effector planned path from cartesian space to joint space and vice versa where a cubic spline interpolation is used for trajectory segments to ensure the continuity in velocity and acceleration. Also, the derived mathematical dynamic model is based on Eular Lagrange energy method to contain the effect of friction and disturbance torques beside the inertia and Coriolis effect. Two types of controller are applied ; the nonlinear computed torque control (CTC
... Show MoreUndesirable growth of potato (Solanum tuberosum L.) crop under an excessive N fertilizer application is the main obstacle presently. This research was conducted to investigate the response of different potato cultivars; Russet Burbank, Shepody, and Superior, and its qualitative characteristics under a series of N rates. Six rates of N fertilization (0–280 kg ha−1) were applied on 11 sites in a randomized complete block design, with four replications. Sites with ≥30 g kg−1 of soil organic matter (OM) produced total tuber yield, marketable yield, and tuber weight per plant 39.5, 45.2, and 54.9%, respectively, higher than sites with ≤30 g kg−1 of OM. Tubers specific gravity increased by 0.18% in the sites with ≥30 g kg−1 of OM.
... Show MoreFor modeling a photovoltaic module, it is necessary to calculate the basic parameters which control the current-voltage characteristic curves, that is not provided by the manufacturer. Generally, for mono crystalline silicon module, the shunt resistance is generally high, and it is neglected in this model. In this study, three methods are presented for four parameters model. Explicit simplified method based on an analytical solution, slope method based on manufacturer data, and iterative method based on a numerical resolution. The results obtained for these methods were compared with experimental measured data. The iterative method was more accurate than the other two methods but more complexity. The average deviation of
... Show MoreThe accurate 3-D coordinate's measurements of the global positioning systems are essential in many fields and applications. The GPS has numerous applications such as: Frequency Counters, Geographic Information Systems, Intelligent Vehicle Highway Systems, Car Navigation Systems, Emergency Systems, Aviations, Astronomical Pointing Control, and Atmospheric Sounding using GPS signals, tracking of wild animals, GPS Aid for the Blind, Recorded Position Information, Airborne Gravimetry and other uses. In this paper, the RTK DGPS mode has been used to create precise 3-D coordinates values for four rover stations in Baghdad university camp. The HiPer-II Receiver of global positioning system was used to navigate the coordinate value. The results wil
... Show MoreCosmetic products must be safe for use by consumers , It is also regulated and required the legislation of countries all over the world . In this study out of 80 cosmetic products analyzed and 32.5% were found to be contaminated .Products such as mascara, lip pencil and eye pencil were analyzed . The contaminants including bacteria such as Staphylococcus aureus , Staphylocoocus epidermidis , Pseudomonas aeruginosa , Escherichia coli and Klebsiella pneumonia which were ranging in number from (103-104 ) C.F.U. /ml and fungi such as Penicillium spp. , <
... Show MoreThe importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreFace Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d
... Show MoreDespite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving
... Show More