A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.
In our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.
In this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
Background: Drug resistant epilepsy is defined as failure of adequate trials of two tolerated, appropriately chosen and used antiepileptic drug schedules to achieve sustained seizure freedom. Up to 30% of patients referred to clinics with a diagnosis of pharmaco-resistant epilepsy may have been misdiagnosed, and many can be helped by optimizing their treatment.Pseudoresistance, in which seizures persist because the underlying disorder has not been adequately or appropriately treated, must be ruled out or corrected before drug treatment can be considered to have failed.
Objectives: The objectives of this study were to determine the causes of drug failure in patients with epilepsy and to differenti
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreBackground : Gastroesophageal reflux disease (GERD) is one of chronic gastrointestinal diseases in which patient may be asymptomatic or was complained from heartburn and regurgitation or pulmonary symptoms. Aim of the study : Examine the serum level of sHLA-G in GERD patients and can be used as a biomarker for early detection of GERD disease. Materials and methods : The design of the study was a case- control prospective enrolled forty patients consulted Gastroenterology Unit- Al-Kindy Teaching Hospital, were diagnosed as GERD by their physician, and compared to second forty control healthy group form January-2023 to May-2024. Serum used for quantitative assessment of soluble HLA-G (sHLA-G) using a sandwich enzyme-linked immunosorbent a
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreFlutter is a phenomenon resulting from the interaction between aerodynamic and structural dynamic forces and may lead to a destructive instability. The aerodynamic forces on an oscillating airfoil combination of two independent degrees of freedom have been determined. The problem resolves itself into the solution of certain definite integrals, which have been identified as Theodorsen functions. The theory, being based on potential flow and the Kutta condition, is fundamentally equivalent to the conventional wing-ection theory relating to the steady case. The mechanism of aerodynamic instability has been analyzed in detail. An exact solution, involving potential flow and the adoption of the Kutta condition, has been analyzed in detail. Th
... Show More