Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
This article is devoted to the stylistic and educational characteristics of the language of Russian diplomacy. The article describes the stylistic and educational aspect of the appearance of the Russian protocol, its relation to universal diplomacy, the relationship between the diplomatic language and the business sub-style. Here the semantic features of the diplomatic vocabulary are determined and the factors influencing its formation and the emergence of new terms in the language of Russian diplomacy are considered. The article also examines the national and cultural identity of the language of Russian diplomacy, provides rules for drafting diplomatic documents and conducting negotiations, defines the concept of a document as a whole, giv
... Show MoreObjective: To find out the relationship between the bio-social aspect with cholelithiasis patients and
demographic characteristics in Baghdad city.
Methodology: A purposive (non-probability) sample of (100) patients, from (20-70) years old, who were
selected from patients who were admitted to hospital at preoperative stage, from Gastroenterology and
Hepatology Hospital, Baghdad Teaching Hospital, Al-Yarmook Teaching Hospital, Al-Karama Teaching
Hospital, Teaching Hospital. A descriptive study was carried out from 25th of June 2004 to the end of October
2004.
An assessment form was constructed for the purpose of the study. Test-retest reliability was employed through
computation of Pearson correlation coefficient.
To avoid the negative effects due to inflexibility of the domestic production inresponse to the increase in government consumption expenditure leads to more imports to meet the increase in domestic demand resulting from the increase in government consumption expenditure. Since the Iraqi economy economy yield unilateral depends on oil revenues to finance spending, and the fact government consumer spending is a progressive high flexibility the increase in overall revenues, while being a regressive flexibility is very low in the event of reduced public revenues, and therefore lead to a deficit in the current account position. And that caused the deficit for imbalance are the disruption of the
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show MoreFace Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d
... Show MoreLA TRANSGRESSION CHEZ RIMBAUD Lecture de I' aspect de Transgression dans Marine
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More