Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreSpeech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
The Turks used the Ottoman Turkish language from the thirteenth century to the twentieth century. During this period and under the influence of Islamic civilization, a large number of words and structures were used from the Arabic and Persian languages, Therefore, many Arabic grammatical structures were used in the Ottoman Turkish language, such as the definite article simply because it was widely used.
The paper is concerned with the use of the Arabic definite article in the Ottoman Turkish language, and the aim of this contrastive study is to find out the similarities and differences between the two languages in terms of meaning and structure. Since linguistic studies depend on the practical side or applied approach, two
... Show MoreThe first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He
Borders Search: Search by students is determined by th
... Show MoreBreast cancer (BC) is the most common malignant tumor in women and the leading cause of cancer deaths worldwide. This work was conducted to estimate the roles of oxidative stress, vitamin B12, homocysteine (HCY), and DNA methylation in BC disease progression. Sixty BC patients (age range 33–80 years) and 30 healthy controls were recruited for this study. Patients with BC were split to group 1 consisted of stage II BC women (low level), and group 2 consisted of patients in stages III and IV (high level). Malondialdehyde (MDA), glutathione peroxidase 3 (GPX3), HCY, and vitamin B12 levels in the study groups were measured. Also, the 5-methylcytosine (5mC) global DNA methylation levels were evaluated. The results showed a significant
... Show More