Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that continuous efforts are required to improve the development of HIPs base text. In this paper, a new proposed scheme is designed for animated text-based HIP; this scheme exploits the gap between the usual perception of human and the ability of computer to mimic this perception and to achieve more secured and more human usable HIP. This scheme could prevent attacks since it's hard for the machine to distinguish characters with animation environment displayed by digital video, but it's certainly still easy and practical to be used by humans because humans are attuned to perceiving motion easily. The proposed scheme has been tested by many Optical Character Recognition applications, and it overtakes all these tests successfully and it achieves a high usability rate of 95%.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More
Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThe impact of Jurisprudence Rules in Addressing Contemporary security Challenges
Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre
... Show MoreIn this research we prepared CdS thin films by Spray pyrolysis method on a glass substrates and we study its structural , optical , electrical properties .The result of (X-Ray ) diffraction showed that all thin films have a polycrystalline structure , The relation of the transmission as a function of wavelength for the CdS films had been studied , The investigated of direct energy gap of the CdS its value is (2.83 eV). In Hall effect measurement of the CdS we find the charge carriers is p – type and Hall coefficient 1157.33(cm3/c) ,Hall mobility 6.77(cm2/v.s)
In this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
Cytokines are A type of protein that is made by certain immune and non-immune cells and has an effect on the immune system. Some cytokines stimulate the immune system and others slow it down. Interleukins (ILs) can be divided into several families with more than 40 subfamily members. They can interact with a variety of cells that alter the immune system and act on a wide range of cancers. In the past several years, ILs have attracted substantial attention because of their distinct roles in CRC that provide a new and promising strategy for CRC. In general, ILs facilitate CRC by promoting tumorigenesis, tumour growth, angiogenesis, and cancer cell invasion and metastasis and inhibit CRC via complex pathways. The Bioassay Technology Human Inte
... Show MoreBackground: Spontaneous abortion means that a pregnancy is lost prior to viability, the loss of a fetus weighing less than 500 g, and the loss of an embryo or fetus at 20 weeks gestation or less (WHO, 2001). Glenville, (2001) has reported that suffering a miscarriage is one of the most devastating things that can happen to a woman, and to her husband. Many women conceive easily and are not emotionally or physically prepared for the shock of losing a baby. Objective: To know effects of spontaneous abortion upon physical status and spiritual beliefs , also find out the association between physical status and spiritual beliefs with study variable (demographic & reproductive). Methodology: A descriptive Analytical study was conducted on Non
... Show MoreBackground: Spontaneous abortion means that a pregnancy is lost prior to viability, the loss of a fetus weighing less than 500 g, and the loss of an embryo or fetus at 20 weeks gestation or less (WHO, 2001). Glenville, (2001) has reported that suffering a miscarriage is one of the most devastating things that can happen to a woman, and to her husband. Many women conceive easily and are not emotionally or physically prepared for the shock of losing a baby. Objective: To know effects of spontaneous abortion upon physical status and spiritual beliefs , also find out the association between physical status and spi