BixSb2-xTe3 alloys with different ratios of Bi (x=0, 0.1, 0.3, 0.5, and 2) have been prepared, Thin films of these alloys were prepared using thermal evaporation method under vacuum of 10-5 Torr on glass substrates at room temperature with different deposition rate (0.16, 0.5, 0.83) nm/sec for thickness (100, 300, 500) respectively. The X–ray diffraction measurements for BixSb2-xTe3 bulk and thin films indicate the polycrystalline structure with a strong intensity of peak of plane (015) preferred orientation with additional peaks, (0015) and (1010 ) reflections planes, which is meaning that all films present a very good texture along the (015) plane axis at different intensities for each thin film for different thickness. AFM measurements for the thin films of BixSb2-xTe3, show that the grain size and the average surface roughness decreases with increasing of the percentage Bi for different thickness.
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreIn this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Stress is an inevitable part of life. Stress occurs when stressful events of self, environmental, or social origin affect the individual's resilience and threaten to collapse his psychological and physical systems. The stress represents difficulties and obstacles that may exceed the individual's ability to bear them and deal with them, which causes him stress and causes negative effects on his psychological and physical health. Therefore, the current research aimed to identify the negative effects of psychological stress on the psychological and physical health of the individual through the literature that dealt with this topic. It was among the results of the research that one of the negative effects of stresses on mental health is the
... Show MoreRoller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a
... Show MoreAbstract : This research is a field study of international cities that hosted various events of which (Sports, Exhibitions, Scientific, Cultural) and other events, these positive impacts on the city driven by such hosts were identified. The research goal was to support hosting events to improve the hostess city and to draw future plans for further developments and to invest event’s hosting to strengthen the city’s value according to a strategic vision that looks for the future the most important conclusions are Entering events hosting is a part of urban development strategies and The most important recommendations are coordination between hosting event activities and its facilities with the infrastructure structure of the host city, its
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show More