1,552 research outputs found

    A Simple method for determining barley reaction to spot blotch disease

    Get PDF
    A simple method was used to determine the reaction of 14 barley genotypes to Cochliobolus sativus, the causal agent of barley spot blotch disease. In this assay, fivetransparent centered circles ranged from resistant to very susceptible, was used to screenbarley genotypes for resistance to the major virulent pathotype Pt4 in barley populationsin Syria. The center of circles placed on the started point of lesion and its extendedthrough the circle could give numerical values for each genotype. The method allows low,intermediate and absolute levels of resistance to spot blotch to be determined. Thetransparent circles method was repeatable and the disease scores obtained were correlated(r = 0.97, P < 0.001) with those obtained by the seedling assay. The established method isboth simple and precisely, it could make a significant contribution in many types ofstudies in plant pathology breeding programs

    Security threats of finger print biometric in network system environment

    Get PDF
    Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented

    Predictors of Culture Competence among Nursing Students in Riyadh City- Saudi Arabia

    Get PDF
    Cultural diversity is one of the challenges for nurses working in multicultural communities, as Kingdom of Saudi Arabia community. Aim of the study was to investigate the cultural competence of Saudi nursing students in Riyadh city. Design: Cross-sectional. Quantitative method applied with self-administered questionnaire. Sample: Convenience sample consists of 205 participants from five private and governmental colleges collected between November 2016 and January 2017. Results: Response rate 70%, the majority of the sample were females (58%), 50% of the participants didn’t get any training regarding care for cultural diverse patients. 36 % of the sample didn’t live in environment with different cultural people. However the majority (87%) provides a care for diverse cultural patients and deal with patients from different cultures. Total scores of culture competence mean among nursing students in Riyadh city was 74.54 ± 14.9. For each item the highest mean was 3.96 ± 0.96 which related to the ability to teach and guide other nurses to display appropriate behavior. Keywords: Nursing students, Cultural, Competence

    Protection of the texts using Base64 and MD5

    Get PDF
    The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. As an example for the two protection mechanisms, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data

    MOIM: a novel design of cryptographic hash function

    Get PDF
    A hash function usually has two main components: a compression function or permutation function and mode of operation. In this paper, we propose a new concrete novel design of a permutation based hash functions called MOIM. MOIM is based on concatenating two parallel fast wide pipe constructions as a mode of operation designed by Nandi and Paul, and presented at Indocrypt 2010 where the size of the internal state is significantly larger than the size of the output. And the permutations functions used in MOIM are inspired from the SHA-3 finalist Grøstl hash function which is originally inspired from Rijndael design (AES). As a consequence there is a very strong confusion and diffusion in MOIM. Also, we show that MOIM resists all the generic attacks and Joux attack in two defense security levels

    Construction of White Male Hegemony in Coetzee's Waiting for Barbarians and Disgrace

    Get PDF
     This article will investigate how Coetzee's white male characters confront their pasts that revolve around abuse of power in both familial relations and the community. For a long time, Coetzee has been in a difficult position regarding his literary identity. He is both criticized and praised by many people about his writings. In this article, I will be investigating how he draws both praise and criticism in the way he constructs white male identity. It is possible that many of these critics do not agree with the writer’s construction of both African and white identities. Coetzee was required to betray his ancestors and oppose the white male dominance. I will determine whether he chose either of them. It is a known fact that none of Coetzee novels were banned by the Apartheid regime. The most probable reason that is often cited by many of his critics is that he was politically correct. An investigation of his representation of white hegemony might put to rest this criticism. Furthermore, it is important to understand his stand against white supremacy at a time many of his colleagues from the civil rights movement were writing about equality and human rights. I will investigate how the characters of his novels feel influenced by those who exercise power in the society. Most importantly, I will examine how masculine identities in the novels fit in the wider society and how they respond to changing power structures because they influence their behavior. My objective is to investigate whether Coetzee ascribed to the patriarchal Boer societal values that marginalized both women and servants into silence. Since masculine discourse is recurring in his other works, it is both an ideological and political discourse representing oppression and colonialism

    Explaining the behaviour of small states: an analysis of Jordan’s nuclear energy policy

    Get PDF
    Conventional analyses claim that small states bandwagon with leading international powers. The dominant view is that small states' vulnerabilities and limited power hinders their ability to pursue policy goals. This study critiques this position by investigating why and how Jordan continues to pursue a nuclear energy programme despite objections from the United States – its principle ally. By using theories of small states, this study analyses discursive practices in Jordanian policy-making. This approach is used to describe Jordan's nuclear energy policy and posit a logic of the effects that energy insecurity has on the government's perception of Jordan as a 'small state'. I use this to create hypotheses concerning the conditions under which small states may not simply bandwagon with key international allies, but may have more freedom to pursue their goals than traditional analyses predict. Explanations that assume small states always have limited freedom to pursue policy goals without the backing of key allies are not supported by the evidence considered here

    The Impact of Accounting Factors on Earning Quality: A Case Study of Commercial Banks in Iraq

    Get PDF
    This research has examined the impact of accounting factors (audit fees, ROA, EPS and debt ratio) on the earnings quality (EQ). The case was the commercial banks listed in Iraq stock exchange, for the period 2011-2015, and the sample was 15 commercial banks. We measured the EQ by using Richardson et al., (2003) model, and the main result were that audit fees, debt ratio, affect EQ, and also revealed that ROA and EPS have no effect on the EQ.

    Joux multicollisions attack in sponge construction

    Get PDF
    Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function usually has two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes of used in modern cryptographic hash function. In this paper, we present multicollisions attack in sponge construction. In 2004, Joux [3] presented multicollision attack in iterated hash function. Our attack is similar to Joux attack but specifically for sponge construction1. We show that finding multicollisions in sponge construction of messages that hash to the same value, is not harder finding ordinary collisions. Then, we use this attack as a tool to prove that concatenating more than one hash function in order to increase the security level does not yield to more secure construction
    corecore