123 research outputs found

    Security Threats to Wireless Networks and Modern Methods of Information Security

    Get PDF
    Network is a technology used to connect computers and devices together. They allow people the ability to move easily and stay in touch while roaming the Internet in the coverage area. This increases efficiency by allowing data entry and access to the site. Comparing wireless networks wired networks in terms of cost, we find that wired networks are more expensive due to the cost of the network connections of electricity and running and add computers and change their positions to suit the network supply. As a result, the use of widespread wireless networks. But there are security gaps in these networks may cause problems for users Security holes intended problem or weakness in the wireless network system may make it easier for hackers to penetrate and steal sensitive data and causing material losses to individuals and companies

    Threats and Problems of Cloud Computing and Ways of Providing Security

    Get PDF
    Cloud computing electronic is a collection of servers and storage spaces operating systems and software platforms and applications of different application that resides on the Internet and you are able to use it without having to know any details of the technique with him all you need to know in order to take advantage of the services it provides is the knowledge of the user name and password your own These services many advantages they face many of the threats and risks that could affect seriously the data and information used if it is seriously keen to understand and put the right solutions to avoid them Cloud computing is the security and protection of the data subject Despite that these clouds may be more defensible from a personal device but the possibility of data loss is a problem The goal of research to identify the cloud computing and the advantages and disadvantages and you must know the gaps and weaknesses and how to identify solution

    Structural and nutritional characteristics of grain sorghum that differ in endosperm texture

    Get PDF
    Call number: LD2668 .T4 1984 E45Master of Scienc

    Security Threats to Wireless Networks and Modern Methods of Information Security

    Get PDF
    Network is a technology used to connect computers and devices together. They allow people the ability to move easily and stay in touch while roaming the Internet in the coverage area. This increases efficiency by allowing data entry and access to the site. Comparing wireless networks wired networks in terms of cost, we find that wired networks are more expensive due to the cost of the network connections of electricity and running and add computers and change their positions to suit the network supply. As a result, the use of widespread wireless networks. But there are security gaps in these networks may cause problems for users Security holes intended problem or weakness in the wireless network system may make it easier for hackers to penetrate and steal sensitive data and causing material losses to individuals and companies

    The Role of Modern Software and Applications in the Protection of Electronic Crimes

    Get PDF
    That scientific development in information and flow techniques in recent years, electronic revolution make a lot of criminals take advantage of scientific inventions and progress of advanced means in the commission of many cyber crimes, and the introduction of other forms of criminality associated with these techniques Which becomes the object of these crimes, or means to commit, and these crimes have increased in the other two, in particular, are led to the dawn of a new criminal phenomenon, known criminality informational or crime-mail, play experience significant role in the proof of cyber crime through the information network, The proof in criminal concept is all that leads to the truth, and for the judgment of the accused in the crime after provable, which means to establish a proof of the crime

    Efficient E-Government Services, Constraints and Problems of Technical Applications and Software and the Transition to Smart Government

    Get PDF
    That e-governance is the concept and structure of the system and the functions and activities of all activities and processes in e-business on the one hand the level of e-government and business on the other. Because the government sector as a significant proportion of the total economic sectors in most countries of the world, and the fact that dealing with the public sector is not limited to the class and not others, but prevail all citizens and residents, institutions and others, and the fact that this multi-dealing in quality, methods and how it is done and models for different procedures and steps implemented and locations between the corridors of government departments, the concept of e-government came as an ideal way for the government to enable them to take care of the interests of the public from individuals and institutions electronically using cutting-edge technology without the need for the applicant to move between government departments

    Effects of Irrigation Interval, Nitrogen and Phosphorus on Grain Yield and biomass of Wheat

    Get PDF
    This study was conducted for two successive seasons of 1998/1999 and 1999/2000, at the Gezira Research Station Farm, Agricultural Research Corporation, Sudan, to investigate the effects of irrigation interval, nitrogen and phosphorus levels on wheat (Triticum aestivum L.( yield and yield components. The study consisted of three irrigation intervals (7,14,21 days), three N levels (0, 43 and 86 kg N/ha) and two P levels (0 and 43 kg P205/ha). Treatments were arranged in a split-split plot design with three replications. Results showed that the irrigation intervals of 7 and 14 days had positive effects on wheat grain and total dry matter yield as compared to the 21 days irrigation interval which negatively affected these parameters. Plants of the latter treatment were dwarf with thin stems and matured earlier resulting in low grain and biomass yields. The study, also, showed that the highest wheat yield was obtained with the application of N and P at the rates of 86 kg N and 43 kg P2O5/ha, respectively, with the irrigation interval of 7 days. &nbsp

    Atypical presentation of COVID-19 in a diabetic patient with malaria-like symptoms: case report

    Get PDF
    Since the emergence of the coronavirus (COVID-19) pandemic beginning in China in 2019, all health workers have faced a difficult  challenge. One challenge is a clinical picture in some cases, where the presenting symptoms do not fit with the usual pattern. In this report, we present a case whose initial symptoms were headache, dizziness, and vomiting suggesting malaria bearing in mind that the patient was from Sudan, where there is a high incidence of malaria. These unusual symptoms may be attributed to the presence of the receptor ACE2, in various body systems. The mild pathological course may be related to the patient’s age and the fact that diabetic patients are less likely to develop lung injury, hence the absence of respiratory symptoms. We recommend that physicians are alert to the variety of different presenting features of COVID-19 and test with Polymerase Chain Reaction (PCR) whenever there is doubt

    Characterization and biological activity studies on some transition metal complexes of thiosemicarbazide derived from 2-picolinic acid hydrazide

    Get PDF
    Mixed-ligand bivalent transition metal ion complexes with N-ethyl-2-picolinoyl hydrazinecarbothioamide (EPHC) and 1,10-phenanthroline (1,10-phen) have been synthesized. The complexes namely [Cu(EPHC)(1,10-phen)(Cl)H2O] (1), [Ni(EPHC)(1,10-phen)(Cl)H2O] (2), [Mn(EPHC)(1,10-phen)(Cl)H2O] (3) and [Co(EPHC)(1,10-phen)(Cl)H2O] (4) were characterized by elemental analysis, spectral (IR, 1H NMR and UV-Vis) and magnetic moment measurements. The magnetic and spectral data indicates octahedral structure for all complexes. Metal complexes have been modeled using parameterized PM3 semi-empirical method. The free ligand and its M(II)-chelates have been screened for their antimicrobial activities. The antibacterial screening demonstrated that, the Cu(II) complex have the maximum and broad activities among the investigated complexes
    • …
    corecore