Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreWilliam Shakespeare's play Coriolanus explores the journey of power and the transformation of a skilled warrior into a statesman. This paper employs Machiavelli’s framework of pragmatic statecraft to analyse Coriolanus’s tragic failure as a political leader despite his unparalleled prowess as a Roman general. It analyses Coriolanus's political career, revealing how his military skills, while effective in warfare, do not translate into political success. The paper shows that Coriolanus’s contempt for performative politics, refusal to adopt civic diplomacy, and failure to soften aristocratic pride with populist appeal turn plebeians against him and alienate patricians. His upholding of martial honour — fostered by his mother Volumnia
... Show MoreAims: The present study aims at assessing mothers’ knowledge of breastfeeding in Kirkuk governorate,
besides determining the relationship between mothers’ knowledge and some of their demographic
attributes.
Methodolgy: A descriptive study was used the assessment approach and applied on mothers in Kirkuk
governorate from January 15th 2011 to July 25th
, 2011. Non-probability sampling a convenience sample of
(72) mothers, attending pediatric general hospital in Kirkuk governorate for following up the health status
of their children, was selected for the purpose of the study. A questionnaire was developed for the
purpose of the study. It was comprised of two parts; the first part includes the mothers' demographic
Suggestive ambiguity is a strategy of defense and maneuvering as it provides the speaker both protection and function. To put it differently, it helps the speaker to say whatever he likes and at the same time gives his opponents and friends the interpretation they desire. This is possible due to the flexibility of the linguistic expressions that the speaker uses. To be more clear, the context of situation, peoples' background and world knowledge interact with the significance of the linguistic expressions reaching an allusive situation where two interpretations, positive and negative, are available to the addressees. Such situation enables the addressers to implicate different ideas or messages, accusations, inciting violence, etc. The pres
... Show More