A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.
The importance of operational risks increases with the increase in technological development, the development of banking operations, the extent of banking compliance, and the attempt of many banks to achieve quality in banking services. And the extent of the position occupied by Iraqi banks for banking compliance and reducing operational risks. The Basel Committee (2) paid its attention to operational risks and the interest of international banks to follow policies that work to ensure banking compliance and cover operational risks, because of its role in reducing losses due to increased costs and achieving an increase in profits. Realizing and working to confront the best possible and traditional methods, that some risks Operational problem
... Show MoreFree water surface constructed wetlands (FSCWs) can be used to complement conventional waste water treatment but removal efficiencies are often limited by a high ratio of water volume to biofilm surface area (i.e. high water depth). Floating treatment wetlands (FTWs) consist of floating matrices which can enhance the surface area available for the development of fixed microbial biofilms and provide a platform for plant growth (which can remove pollutants by uptake). In this study the potential of FTWs for ammoniacal nitrogen (AN) removal was evaluated using experimental mesocosms operated under steady-state flow conditions with ten different treatments (two water depths, two levels of FTW mat coverage, two different plant densities and
... Show MoreBackground: Toxoplasma gondiiis an obligate intracellular protozoan that may infect nearly all warm-blooded animals, including humans. T gondiiis thought to infect one-third of the human population.The symptoms depending on the adequacy of the immune antiparasitic response. In humans, the main source of infection is through contact with the feces of infected cats, the final host in which the T. gondii completes its life cycle. Other source of infection occurs when drinking raw milk, ingestion of contaminated meat. Aim: This descriptive study estimated the seroprevalence and risk variables for Toxoplasma gondii infection forundergraduate students of a college of Pharmacy who were studying at University of Baghdad. The frequency rate ofToxopl
... Show MoreObjectives: Many medication errors occur in the hospital, and these can endanger patients. The purpose of this study was to evaluate the incidence of medication errors in hospitalized patients, and to categorize the most frequent types of errors, and to asses the possible measures that may prevent the occurrence of such errors.
Methods: A prospective, exploratory, and evaluative study, using direct observation method to detect medication errors in adult hospitalized patients in medical and surgical units in Baquba Teaching Hospital- Diyala-Iraq.. The files of 299 patients had been reviewed from July 2009 to September 2009, including medication orders and treatment sheets to detect existing errors. The detected errors were recorded and
In the nineteenth century, a new type of cities appeared, known as new cities located on the edges of major cities, and these cities began to decentralization, urban studies turned to this type of cities to find out the most important reasons for the emergence of new cities and find out what those cities will become . Therefore, we will discuss in this research how the urban emergence of these cities (edge cities) occurs, so the research formulates its problem : The need to know the stages that edge cities go through, ending with their emergence, and the mechanisms that cities take within their context ( regeneration or adaptation ), Assuming that edge cities are a
... Show MoreThe structure is considered in its scientific formula one of the concepts which complete the architectural image that seeks to take out an effective and attractive structure in contemporary architectural production, especially that the structure -in general- represents strength in addition to delight and functional benefits according to Vitruvius trinity. So, the role of structure depends on making its aesthetical properties able to give efficiency within architectural product. That has come through adoption of intellectual mechanism of structural means and details –as a whole or parts- and focused on structure with the recipient's needs, aesthetical, and sensory purposes in addition to its fundamental role of stabilit
... Show MoreDiacerein (DCN) is a semi-synthetic anthraquinone derivative of Rhein that is indicated for the management of osteoarthritis. Diacerein exhibits poor dissolution in the GIT fluids and suffers from low bioavailability upon oral administration in addition to the laxative effect of Rhein metabolites. The aim of the present study was to develop novasomal vesicles with optimized entrapment efficiency and size to serve as a carrier for transdermal delivery of diacerein. Novasomal vesicles were prepared by thin film hydration method thin film hydration. The prepared vesicles were optimized utilizing different surfactant to cholesterol molar ration, sonication type, different sonication times and varying fatty acid level. The prepared vesicles were
... Show MoreIn front of the serious deterioration of the elements of the environment, new convictions arose the need to integrate into the global environmental concerns as being one and the issue of shared responsibility and the impact of this conviction, the evolution of the environment protection law in many countries, including Algeria. Due to the multiplicity of perceptions about the environmental result of multiple scientific disciplines, the legislative concept emerged to protect the environment, which includes prevention and rational management and conservation and restoration and repair.
Environmental planning for the various governments and countries aims to avert disasters and achieve the
... Show MoreEnergy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More