A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreAfter the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking se
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a
... Show MoreThe Fylex extract exert a high inhibition effect against A . flavus growth on PDA medium, as the fungus growth was completely inhibited by 100% at a concentration of 0.2 and 0.3% of studied extract, while the lowest inhibition percentage (71%) was found at a concentration of 0.1%. Whereas magnesium oxide nanoparticles showed the highest inhibition ratio of A. flavus (100%) was detected at 0.2% and the lowest inhibition ratio (81.66%) was at concentration 0.5%. Moreover, the addition of G. lucidum powder to PDA medium with a concentration of 2.5 mg increased the inhibition rate of A. flavus growth which was 54.4%, while the lowest inhibition ration (18.22%) was found at a concentration of 1000 mg. The milky liquid (brocade milk) of Calotropi
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
The aim of the present study is to compare the biochemical action of the three vaccines taken in Iraq: Pfizer Biontech, AstraZeneca Oxford and Sinopharm based on biochemical parameters. Seventy COVID-19 Iraqi patients ( males and females ) were participated in the present study and classified into 7 groups : Gc : COVID-19 patients ( without vaccine ) , Gp1: COVID-19 patients took one dose of Pfizer Biontech, Gp2 : COVID-19 patients took two doses of Pfizer Biontech, Ga1 : patients took one dose of AstraZeneca Oxford vaccine , Ga2: patients took two doses of AstraZeneca Oxford vaccine , Gs1 : patients took one dose of Sinopharm vaccine and Gs2:
... Show MoreDespite the G protein-coupled receptors (GPCRs) being the largest family of signalling proteins at the surface of cells, their potential to be targeted in cancer therapy is still under-utilised. This review highlights the contribution of these receptors to the process of oncogenesis and points to some likely challenges that might be encountered in targeting them. GPCR-signalling pathways are often complex and can be tissue-specific. Cancer cells hijack these communication networks to their proliferative advantage. The role of selected GPCRs in the different hallmarks of cancer is examined to highlight the complexity of targeting these receptors for therapeutic benefit. Our
... Show MoreThe labor inspector may be exposed - while performing his duties that are legally assigned to him - to threats or attacks on him by employers, which makes it impossible for the inspector to perform these jobs.
This has prompted international and Arab labor inspection standards, as well as national labor laws, to emphasize the need to provide security support and legal protection for the labor inspector, and to punish employers' violators, with the aim of extending the authority and prestige of the state and ensuring the enforcement of laws and thus achieving the goals for which it was legislated.
Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More