Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThe experiment was conducted to study the effect of
antigibberellin Cultar , Ethephon and GA3 at concentration of (5,15,25 ppm) on surface growth of Rhizoctiona solani and Fusraium oxysporum . The results indicated that Cultar (15 , 25 ppm) decreased the surface growth of both fungi . Ethephon of the same concent
... Show MoreExplain in this study, thickness has an inverse relationship with electrical resistivity and a linear relationship with Grain boundary scattering. According to the (Fuchs-Sondheier, Mayadas-Shatzkces) model, grain boundary scattering leads To an Increase in electrical Resistivity. The surface scattering Coefficient of Ag, which Fuchs-Sondheier and Mayadas-Shatzkces measured at , Ag's grain boundary reflection coefficient , which Mayadas-Shatzkces measured at , If the concentration of material has an effect on metal's electrical properties, According to this silver is a good electrical conductor and is used frequently in electrical and electronic circuits.
The researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.
In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynami
... Show MoreLawful protection of the human gene conceded a moral concern regarding the future of existence human. After the discovery of the human genetic map, scientific experiments and research related to the human gene increased, negative applications of genetic engineering in particular that violate essential human rights, the right to human dignity to be specific. These practices represent actual challenges to the existence and diversity of current and future generations. Therefore, the presence of legal rules at the domestic and global levels is an absolute necessity to prohibit these threats and determine civil and criminal accountability for those who infringe any laws related to this issue.
Theoretical trends have appeared Which posed the concept of biological structures in contemporary architecture concept, Spread through the emergence of architectural production that reflect and indicate the nature of the construction structures based on the ideas and principles of biological structures in biological science: Despite the emergence of many architectural proposals that tried to explain the concept in the field of architecture, but it is not dealt with in depth and not given a comprehensive definition: So there was need to search for the concept and its beginning in the biological field as a general framework down to the field of architecture for the purpose of reducing the limits of their search framework T
... Show More