From the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim
Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreThe main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreA Multiple System Biometric System Based on ECG Data
The problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MoreThe problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MorePassword authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.