This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition. This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
Cox regression model have been used to estimate proportion hazard model for patients with hepatitis disease recorded in Gastrointestinal and Hepatic diseases Hospital in Iraq for (2002 -2005). Data consists of (age, gender, survival time terminal stat). A Kaplan-Meier method has been applied to estimate survival function and hazerd function.
The business process re-engineering is one of the popular concepts at this time because its provide a radical solution for the problems that companies faces. This method appeared because the changes of competition and costumers 'desires at the two last decades. The markets become wider because of the globalization so the companies must change its way to stay a life.
The research aim is to concentrate on the BPR because it's a philosophy aims to re-organize the company's business process to achieve the competitive advantage, the research also aims to a plicate the BPR using cost management technique in the State Company of Vegetable Oils Industry.
&nb
... Show MoreThis research aims to know the effect of the strategy of map bubbles on developing the skills of science operations among 5th grade literary students in the subject of rhetoric and application, and the design of the experimental and control groups with the pre and post-tests was used. The research sample consisted of (50) students divided into two groups, an experimental group of which reached the number of its members is (25) students and studied using the strategy of map bubbles, and a control group of its members reached (25) students and studied in the traditional (standard) method. The researchers prepared a multiple-choice achievement test with several (30) paragraphs, and its validity and consistency were extracted. Then the test was
... Show MoreFour complexes of Co(II),Ni(II),Cu(II) and Zn(II) with the azo ligand (4-chloro-N-(2-(dimethylamino)ethyl)-5-((2-hydroxy- 4,6-dimethylphenol)diazenyl)-2-methoxybenzamide) L. The structure of ligand and complexes were confirmed on the basis of their analytical and spectral data, these dyes were tested as dyeing in cotton fabric, and also testing in light and cleaner firmness. Also, antimicrobial and antifungal activities of ligand and their complexes were evaluated and the results showed that the ZnL compound showed the higher antibacterial activity with inhibition zone of 13mm against Staphyloco-ccus epidermidis, Steptococcus sp. and Escherichia coli compared with ligand and other metal complexes .In case of ZnL compound the antifungal acti
... Show MoreFour complexes of Co(II),Ni(II),Cu(II) and Zn(II) with the azo ligand (4-chloro-N-(2-(dimethylamino)ethyl)-5-((2-hydroxy-4,6-dimethylphenol)diazenyl)-2-methoxybenzamide) L. The structure of ligand and complexes were confirmed on the basis of their analytical and spectral data, these dyes were tested as dyeing in cotton fabric, and also testing in light and cleaner firmness. Also, antimicrobial and antifungal activities of ligand and their complexes were evaluated and the results showed that the ZnL compound showed the higher antibacterial activity with inhibition zone of 13mm against Staphyloco-ccus epidermidis, Steptococcus sp. and Escherichia coli compared with ligand and other metal complexes .In case of ZnL compound the antifungal activ
... Show More