A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
Abstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
The Security Council has an active role in addressing international crises and dealing with their causes. The Libyan crisis is one of the most important real tests of the Security Council and its role in maintaining international peace and security, as the Council has proven so far an ineffective role in resolving the crisis and dealing withtheir causes, which has prolonged its duration and increased its complexities and dangerous repercussions, perhaps the most prominent of which is the threat of the recently achieved cease-fire and the formation of a new transitional government led by Abdel Hamid al-Dabaiba, the growing significant obstacles facing the political process, foremost of which is the continued presence of foreign forces , m
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show More<p>In this paper, we prove there exists a coupled fixed point for a set- valued contraction mapping defined on X× X , where X is incomplete ordered G-metric. Also, we prove the existence of a unique fixed point for single valued mapping with respect to implicit condition defined on a complete G- metric.</p>
Semiconductor-based photocatalytic processes are widely applied as ecofriendly technology for degrading organic pollutants. Establishing photocatalytic heterojunctions with Z-type photocarriers transfer pathways is projected to be a superb strategy to enhance photocatalytic behavior. In this paper, novel and stable (0D/2D) heterojunctions of CoS-embedded boron-doped g-C3N4 (CoS/BCN) with a high rate of charges transfer/separation were assembled for degradation of malachite green dye (MG). The CoS/BCN photocatalyst achieves a photodegradation efficiency of 96.9 % within 1 h of LED illumination, which is 2.5 and 1.4-fold enhancement compared with bare g-C3N4 and BCN, respectively. Besides, the results of species-trapping trials exhibited that
... Show MoreCryptosporidiosis is mainly cause a persistent diarrhea in immune compromised patients, BALB/c mice have been suppressed by dexamethasone, tissue Th1, Th2 and Th17 cytokines concentrations in the ileum were significantly diminished in both infected and immunosuppressed mice. Level of IFN-g, TNF-a, IL-12, IL-6, IL-17A was increased in level, IL-4 didn’t increases, in both ileal and spleen tissue. Levels of above cytokines were examined in spleen in order to follow the proliferation of CD4+ T-cell during C. parvum infection.
Expanded use of antibiotics may increase the ability of pathogenic bacteria to develop antimicrobial resistance. Greater attention must be paid to applying more sustainable techniques for treating wastewater contaminated with antibiotics. Semiconductor photocatalytic processes have proven to be the most effective methods for the degradation of antibiotics. Thus, constructing durable and highly active photocatalytic hybrid materials for the photodegradation of antibiotic pollutants is challenging. Herein, FeTiO3/Fe-doped g-C3N4 (FTO/FCN) heterojunctions were designed with different FTO to FCN ratios by matching the energy level of semiconductors, thereby developing effective direct Z-type heterojunctions. The photodegradation behaviors of th
... Show More