In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreVol. 6, Issue 1 (2025)
Corrosion experiments were carried out to investigate the effect of several operating parameters on the corrosion rate and corrosion potential of carbon steel in turbulent flow conditions in the absence and presence of sodium benzoate inhibitor using electrochemical polarization technique. These parameters were rotational velocity (0 - 1.57 m/s), temperature (30oC – 50oC), and time. The effect of these parameters on the corrosion rate and inhibition efficiency were investigated and discussed. It was found that the corrosion rate represented by limiting current increases considerably with increasing velocity and temperature and that it decreased with time due to the formation of corrosion product layer. The corrosion potential shifted t
... Show MoreIn this study, geopolymer mortar was designed in various experimental combinations employing 1% micro steel fibers and was subjected to different temperatures, according to the prior works of other researchers. The geopolymer mortar was developed using a variety of sustainable material proportions (fly ash and slag) to examine the influence of fibers on its strength. The fly ash weight percentage was 50%, 60%, and 70% by slag weight to study its effect on the geopolymer mortar's properties. The optimal ratio produced the most significant results when mixed at a 50:50 ratio of fly ash and slag with 1% micro steel fibers at curing temperature 240oC for 4 hours through two days. The compressive strength of the geopolymer mortar increas
... Show MoreIn this study, the effect of the combination of micro steel fibers and additives (calcium hydroxide and sodium carbonate) on the size of cracks formation and healing them were investigated. This study aims to apply the use of self-healing phenomenon to repair cracks and to enhance the service life of the concrete structures. Micro steel fibers straight type were used in this research with 0.2% and 0.4% by volume of concrete. A weight of 20 and 30 kg/m3 of Ca(OH)2 and 2 and 3 kg/m3 of Na2CO3 were used as a partial cement replacement. The results confirm that the concrete cracks were significantly self-healed up to 30 days re-curing. Cracks width up to 0.2 mm were comp
... Show More