Security Problems in an RFID System
...Show More Authors
(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreBackground: It's believed that HBD-3 is involved in the tissue remodeling process of articular cartilage. Also, HBD-3 has anti-inflammatory properties. Objectives: The purpose of this study is to assay human beta-defensine-3 (HBD-3) in serum from rheumatoid arthritis (RA) patients and investigate its correlation with proinflammatory cytokines. Methods: In this case-control study, fifty-eight RA patients were aged 20–65 years, and 29 age-matched healthy subjects (HS) had no inflammatory rheumatic diseases. The disease activity score-28 joint erythrocyte sedimentation rate (DAS28-ESR) was used to measure RA activity. CRP, ACPA, HBD-3, TNF-α, and IL-1β were assessed using the enzyme-linked immunosorbent assay technique (ELISA). Res
... Show MoreThe study involved 120 women, who were distributed into two groups of breast tumor patients (30 malignant and 30 benign) and a group of controls (60 women). The patients were referred to the Center for Early Detection of Breast Tumor at Al-Alwayia Hospital for Gynecology and Obstetrics (Baghdad) during the period June-December 2011. They were investigated for the frequency of ABO blood group phenotypes, menopausal status, oral contraceptive use, body mass index and family history of breast cancer or other cancers. The results demonstrated that 60.0% of malignant cases clustered after the age 50 years, while it was 20.0% in benign cases. Fifty percent of malignant breast tumor patients reached menopause, while in benign cases, the corresp
... Show MoreThe research aims to identify how to enhance the quality of the human resources, focusing on four dimensions (efficiency, effectiveness, flexibility, and reliability), by adopting an adventure learning method that combines theoretical and applied aspects at the same time, when developing human resources and is applied using information technology, and that Through its dimensions, which are (cooperation, interaction, communication, and understanding), as the research problem indicated a clear deficiency in the cognitive perception of the mechanism of employing adventure learning dimensions in enhancing human resources quality, so the importance of research was to present treatments and proposals to reduce this problem. To achieve
... Show More