Indium Antimonide (InSb) thin films were grown onto well cleaned glass substrates at substrate temperatures (473 K) by flash evaporation. X-ray diffraction studies confirm the polycrystalline of the films and the films show preferential orientation along the (111) plane .The particle size increases with the increase of annealing time .The transmission spectra of prepared samples were found to be in the range (400-5000 cm-1 ) from FTIR study . This indicates that the crystallinity is improved in the films deposited at higher annealing time.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreInduced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H2O2 concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
The current study aims to develop a proposed educational program based on augmented reality (AR) technology, in addition to assessing its effectiveness in developing research and historical imagination skills of the Humanities Track's female students at the secondary stage, as well as assessing the correlative and predictive relationships between the amount of growth for the two dependent variables. To achieve this, a secondary school in the city of Makkah Al-Mukarramah was chosen, and an available random sample of (30) female students from the study population was selected. The quasi-experimental approach was followed by this study, particularly one group design. In addition, two tools were used to collect study data, namely: a test of
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreAbstract
The Research Includes Two Variables : First , Academic Accreditation with his dimensions ( Educational Context , Educational Inputs , Educational Process , Educational Outputs , Feedback ) , And The Second : Strategic Performance With His dimensions ( Financing , Satisfaction Stakeholders , Internal Processes , Learning And Growth ) , The Research Highlights On The Academic Accreditation System Which Is Considered A Major And Important Systems Can Through Which Administration Of Activities And Programs Institutions Of Higher Education , As This research aims to determine his relationship And The Extent Of Its Effect In The Strategic Performance , And It Includes The Research C
... Show MoreCurrent search aims to identify the creative thinking of the kindergarten teachers and
solving professional problems among kindergarten teachers skills, and whether the level of
creative thinking in solving professional problems, according on marital status years of
service academic achievement of teachers as well as to identify the correlation between the
two variables the current sample consisted of (300) teachers to achieve the objectives of the
stndy , the researcher used two measures, one to measure creative thinking and the other to
measure the solution to the problems of professional kindergarten teachers skills. It has been
shown. validity and reliability of the two measures. The present stndy aims to identif