Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that continuous efforts are required to improve the development of HIPs base text. In this paper, a new proposed scheme is designed for animated text-based HIP; this scheme exploits the gap between the usual perception of human and the ability of computer to mimic this perception and to achieve more secured and more human usable HIP. This scheme could prevent attacks since it's hard for the machine to distinguish characters with animation environment displayed by digital video, but it's certainly still easy and practical to be used by humans because humans are attuned to perceiving motion easily. The proposed scheme has been tested by many Optical Character Recognition applications, and it overtakes all these tests successfully and it achieves a high usability rate of 95%.
The behavior of externally prestressed composite beams under short term loading has been studied. A computer program developed originally by Oukaili to evaluate curvature is modified to evaluate the deflection of prestressed composite beam under flexural load. The analysis model based on the deformation compatibility of entire structure that allows to determine the full history of strain and stress distribution along cross section depth, deflection and stress increment in the external tendons .
The evaluation of curvatures for the composite beam involves iterations for computing the strains vectors at each node at any loading stage. The stress increment determined using equations depended on the member deflection at points of connecti
Leishmania is one of the protozoan parasites that are transferred to human by infected sand flies and gives rise to a range of diseases entitled as Leishmaniasis. More than 20 known species of Leishmania can infect humans and cause various clinical symptoms. Three most known clinical manifestations are Cutaneous Leishmaniasis (CL), Mucocutaneous Leishmaniasis (MCL) and Visceral Leishmaniasis (VL) (kala-azar or black fever). The difference in the clinical form dependent on several factors: species of Leishmania, type of vector that transmits the Leishmania, and the immune status of an infected individual. The current drugs which are used as anti-leishaminial treatment are characterized by enormou
... Show MoreThe varied thermal conductivity (insulation) of silica aerogel with heating for different pH has been investigated, it has been depended on ambient pressure drying method in the preparing silica aerogel samples, also six different pH of samples (1, 2, 3, 7, 8 and 9) were treated under five degree of heating with (50,100,150,200 and 250) ᴼC. This technique is important to test the carry-outs hydrophobic silica to temperature without high-quality material changes in the basic characteristics. The hot-wire technique is used in this work to examine the thermal conductivity, Fourier Transform Infrared Spectroscopy (FTIR) depended to characterize the bonds and their artificial by heating. Resu
... Show MoreThe Invar effect in 3D transition metal such as Ni and Mn, were prepared on a series composition of binary Ni1-xMnx system with x=0.3, 0.5, 0.8 by using powder metallurgy technique. In this work, the characterization of structural and thermal properties have been investigated experimentally by X-ray diffraction, thermal expansion coefficient and vibrating sample magnetometer (VSM) techniques. The results show that anonymously negative thermal expansion coefficient are changeable in the structure. The results were explained due to the instability relation between magnetic spins with lattice distortion on some of ferromagnetic metals.
Tin dioxide (SnO2) were mixed with (TiO2 and CuO) with concentration ratio (50, 60, 70, 80 and 90) wt% films deposited on single crystal Si and glass substrates at (523 K) by spray pyrolysis technique from aqueous solutions containing tin (II) dichloride Dihydrate (SnCl2, 2H2O), dehydrate copper chloride (CuCl2.2H2O) and Titanium(III) chloride (TiCl3) with molarities (0.2 M). The results of electrical properties and analysis of gas sensing properties of films are presented in this report. Hall measurement showed that films were n-type converted to p- type as titanium and copper oxide added at (50) % ratio. The D.C conductivity measurements referred that there are two mechanisms responsible about the conductivity, hence it possess two act
... Show MoreThis study aimed to explore whether green synthesized copper nanoparticles (CuNPs) can function as an anti-biofilm agent produced by P. mirabilis. The nanoparticles were synthesized from cells free extract of P. mirabilis. Characterization of biosynthesized copper nanoparticles was carried out to determine the chemical and physical properties of the product using atomic-force microscopy (AFM), transmission electron microscopy (TEM), field emission scanning electron microscopy (FESEM), X-ray diffraction (XRD) and UV-visible spectroscopy. The hexagonal structure was confirmed by XRD, size range was marked 13-19nm by TEM. FESEM was used to confirm the surface morphology. AFM analysis was used to reveal the roughne
... Show MoreRecognizing facial expressions and emotions is a basic skill that is learned at an early age and it is important for human social interaction. Facial expressions are one of the most powerful natural and immediate means that humans use to express their feelings and intentions. Therefore, automatic emotion recognition based on facial expressions become an interesting area in research, which had been introduced and applied in many areas such as security, safety health, and human machine interface (HMI). Facial expression recognition transition from controlled environmental conditions and their improvement and succession of recent deep learning approaches from different areas made facial expression representation mostly based on u
... Show MoreEnergy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show More