Security Problems in an RFID System
...Show More Authors
Herein, an efficient inorganic/organic hybrid photocatalyst composed of zeolitic imidazolate framework (ZIF-67) decorated with Cd0.5Zn0.5S solid solution semiconductor was constructed. The properties of prepared ZIF- [email protected] nanocomposite and its components (ZIF-67 and Cd0.5Zn0.5S) were investigated using XRD, FESEM, EDX, TEM, DRS and BET methods. The photocatalytic activity of fabricated [email protected] nanocomposite were measured toward removal of methyl violet (MV) dye as a simulated organic contaminant. Under visible-light and specific conditions (photocatalyst dose 1 g/l, MV dye 10 mg/l, unmodified solution pH 6.7 and reaction time 60 min.), the acquired [email protected] photocatalyst showed advanced photocatalytic activity
... Show MoreIn folk medicine there are various medicinal amalgamation possessing hepatoprotective activity. This activity is of significance because several toxins cause liver injury. Hence, many pharmaceutical companies are targeting herbal medicines for the treatment of liver abnormalities and towards evolving a safe and effective formulation with desired route of administration. In current review we have focused on the studies showing hepatoprotective effect using marine compounds and plant derived compounds. Liver disorder, a global health problem, usually include acute or chronic hepatitis, heptoses, and cirrhosis. It may be due to toxic chemicals and certain antibiotics. Uncontrolled consumption of alcohol also affects liver in an unhealthy wa
... Show MoreThe objective of this paper is to study the stability of SIS epidemic model involving treatment. Two types of such eco-epidemiological models are introduced and analyzed. Boundedness of the system is established. The local and global dynamical behaviors are performed. The conditions of persistence of the models are derived.
The paper generates a geological model of a giant Middle East oil reservoir, the model constructed based on the field data of 161 wells. The main aim of the paper was to recognize the value of the reservoir to investigate the feasibility of working on the reservoir modeling prior to the final decision of the investment for further development of this oilfield. Well log, deviation survey, 2D/3D interpreted seismic structural maps, facies, and core test were utilized to construct the developed geological model based on comprehensive interpretation and correlation processes using the PETREL platform. The geological model mainly aims to estimate stock-tank oil initially in place of the reservoir. In addition, three scenarios were applie
... Show MoreA solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.
The study aims to clarify the truth of hearing the dead, and then the statement of the legitimate judgment of the indoctrination, by reference to the evidence contained in that regard, and try to combine and reconcile those evidence, and the study finds that the most correct in the matter of hearing is to say hearing the dead in the will of God and how Almighty teaches , As up to that indoctrination of the dead is permissible, so as to combine evidence.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreIt is an analytical study carried out at university of Basra using a sample included the dean ,assistants and managers of scientific dept. in the university for about(63)managers .The study aimed at discovering a model of crises management in the university.The researcher adopted the descriptive survey methodology.To achieve the objective of the study ,a questionnaire of (41)statements was developed covering five main variables like ,signal detection, prevention and preparedness, response, recovery and learning .The validity of the questionnaire was done by a group of referees .Its stability was determined by Cronbach,s Alfa .The questionnair,s stability coefficient was(0.
... Show More