One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an overview of biometrics systems and approaches in the post-COVID-19 pandemic. The fundamental COVID-19 prevention rules are first reviewed. The relationships between each regulation and the biometrics that may be impacted are then thoroughly investigated. Recommendations for future trends of feasible approaches are provided to assist researchers in advance and enhance the performance of the biometric system for the post-COVID-19 pandemic environment.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe depreciation of the Iraqi dinar against the US dollar, reaching low levels and causing disruptions in the local markets, has had detrimental effects on individuals and companies, particularly those with limited income and the poor. The local currency approached around 1600 dinars per dollar, after the official exchange rate had stabilized at around 1450 dinars per US dollar. This depreciation in the value of the Iraqi dinar can be attributed to financial speculation among currency traders, which directly affected exchange rates and illicit dollar smuggling operations. Bank transfers are also important alongside financial transactions, especially in light of current economic developments in the 21st century. To prevent currency s
... Show MoreThe danger of the attacks of 9/11 in America, mainly on the WorldTrade Center at Ground Zero, had brought America into a position thatnever seen before. People who lived there faced a historical calamity marked a turning point in history and a beginning of a new era. Thepaper examines the behavior of traumatized individuals in relation tosociety that trauma involves both. The socio cultural approach willachieve the goal. It studied the responses of the individuals to the event and the motives behind these reactions. Don DeLillo, a member of apost 9/11 group of writers, an American novelist of Italian origin, through his portrayal of the characters, tries to present a vivid image t
... Show MoreThe current research aims to: 1- Identify the emotional sensitivity of children from the parents' point of view. 2- Identifying the differences in the emotional sensitivity of children from the parents ’point of view, according to the parents’ gender variable (father - mother). The basic research sample consisted of (285) male and female students from the sixth grade (primary school), chosen in a randomized stratified method from the districts (Al-Karkh and AlRasafa). While the sample of statistical analysis amounted to (200) father and (200) mothers of male and female students who were randomly selected from the sixth grade of the education directorates (Al-Karkh and Al-Rasafa). The two researchers also used a number of sta
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
This study aims at identifying the correlation between digital transformation and knowledge building in educational institutions, as well as finding the influence relationship between digital transformation and knowledge building in educational institutions and knowing the dimensions of digital transformation that have the most impact in improving the level of knowledge building, and by adopting the methodological descriptive analysis method in the Ministry of Education. Education and educational institutions in Baghdad. This research deals with digital transformation as an independent variable according to two dimensions (digital adaptability and digital readiness). Knowledge building was adopted as an approved variable using the s
... Show More