A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.
System is one of the concepts that fused stages of human thought his contemplations , and the evolution of his ideas and know the universe and existence , was formed several systems and numerous multi- humanitarian field , for example : the political system , the economic system , the system of philosophical , scientific system ... etc. .The current research around trying to find the identity of the system aesthetic in general and theater in particular , the detection of compositions and how Cklath within shifts functional and conceptual , which confirms the importance of Altgria creative as characterized by the following heading towards experimentation and update ongoing , and in particular what we find in the discourse of postmodernism
... Show MoreConstruction is a complicated process that takes place in an almost uncontrollable environment. Although projects can be carefully planned in advance in principle, there is a chance that unforeseen events and crises can disrupt these plans, affecting project development. Because the initial investment expenditures in construction projects are so large, they may be quickly influenced by crises, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which significantly impacted various activities in general and the construction industry in particular. Despite the importance of crisis management systems, the researchers found a great lack of local studies l
... Show MoreA simulated ion/electron optical transport and focusing system has been put forward to
be mounted on high voltage transmission electron microscope for in situ investigations.
The suggested system consists of three axially symmetric electrostatic lenses namely an
einzel lens, an accelerating immersion lens, and a decelerating immersion lens, in addition
to an electrostatic quadrupole doublet lens placed on the image side. The electrodes
profile of these lenses is determined from the proposed axial field distributions. The
optical properties of the whole system have been computed together with the trajectory of
the accelerated charged-particles beam along the optical axis of the system. The computed
dimensions of th
The effect of mixed corrosion inhibitors in cooling system was evaluated by using carbon steel specimens and weight loss analysis. The carbon steel specimens immersed in mixture of sodium phosphate (Na2 HPO4) used as corrosion inhibitor and sodium glocunate (C6 H11 NaO7) as a scale dispersant at different concentrations (20,40, 60, 80 ppm) and at different temperature (25,50,75 and 100)ºC for (1-5) days. The corrosion inhibitors efficiency was calculated by using uninhibited and inhibited water to give 98.1%. The result of these investigations indicate that the corrosion rate decreases with the increase the corrosion inhibitors concentration at 80 ppm and at 100ºC for 5 days, (i.e,
... Show Moreالنظام السياسي اليمني : دراسة في المتغيرات الداخلية
The objective of the current research was to develop the posaconazole (PCZ) loaded NS into the carbopol 934 polymeric gel for prolonged drug release and improved topical delivery; seven different nanosponge formulations of PCZ were formulated using the emulsion solvent diffusion method using various amounts of polymer (ethylcellulose, EC). The aqueous and dispersed phases were prepared using polyvinyl alcohol (PVA) and dichloromethane. The prepared nanosponges (NS) were studied for particle size, structural appearance, and in vitro drug release. Furthermore, the selected formula was formulated as hydrogel and was evaluated for physical characteristics, drug content, and in-vitro drug release. Morphological studies revealed irregular
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More