Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
يرغب المرء أن يعيش في منزل يعبر عن اصالة تصميمه ذا اهداف جمالية كحاجته الى تحقيق الأهداف العملية. وعليه فمن الأهمية بمكان ان يشارك أصحابه مع المعنيين[1] بشؤون التصميم... وهنا ارتأت الباحثة ان تقوم بدراسة علمية حديثة حول ورق الجدران ثلاثي الابعاد وتوظيفة في غرفة المعيشة, وباسلوب عصري حديث يجمع بين جمالية التصميم والحداثة , إضافة الى تناول الإضاءة لما لها من دور في ابراز معالم وتفاصيل الأثاث
... Show MoreIn this study, a total of 209 individuals of leeches were collected from Al-Hindyia River / Babil Province. 116 individuals were identified as Erpobdella octaculata (Linnaeus, 1758), 50 individuals as Erpobdella punctata (Leidy,1870) and 43 individuals as Hemiclepsis marginata (Müller, 1774). Four samples were collected monthly during a period from February to June 2018. Some physical and chemical water properties were also examined, including air and water temperature, potential of hydrogen pH, Electrical Conductivity EC, Total Dissolved Solid TDS, Dissolved Oxygen DO, and the Biological Oxygen Demand BOD₅. Air and water temperature were r
... Show MoreThe Exponentiated Lomax Distribution is considered one of the most commonly used continuous distribution which has a major role in analysing and modelling life time data. Therefore, A family was formed for the Exponential Lomax Distribution by introducing two new distributions as special case of the Exponentiated Lomax Distribution: (Modified Exponentiated Lomax Distribution (MELD) and Restricted Exponentiated Lomax Distribution (RELD. Furthermore, to assess the usefulness and flexibility, the two distributions were applied upon simulation study besides real application with real data set. The simulation results clearly shown the flexible performance of the maximum likelihood estimators for the parameter. Also, the real applicat
... Show MoreLinear discriminant analysis and logistic regression are the most widely used in multivariate statistical methods for analysis of data with categorical outcome variables .Both of them are appropriate for the development of linear classification models .linear discriminant analysis has been that the data of explanatory variables must be distributed multivariate normal distribution. While logistic regression no assumptions on the distribution of the explanatory data. Hence ,It is assumed that logistic regression is the more flexible and more robust method in case of violations of these assumptions.
In this paper we have been focus for the comparison between three forms for classification data belongs
... Show MoreThis paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show More