Preferred Language
Articles
/
KRaQ4osBVTCNdQwCX-NH
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an overview of biometrics systems and approaches in the post-COVID-19 pandemic. The fundamental COVID-19 prevention rules are first reviewed. The relationships between each regulation and the biometrics that may be impacted are then thoroughly investigated. Recommendations for future trends of feasible approaches are provided to assist researchers in advance and enhance the performance of the biometric system for the post-COVID-19 pandemic environment.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Cost Reduction and Sustainable Business Practices; A conceptual approach
...Show More Authors

An excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.

The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Engineering
A Comparison Study of Brine Desalination using Direct Contact and Air Gap Membrane Distillation
...Show More Authors

Membrane distillation (MD) is a hopeful desalination technique for brine (salty) water. In this research, Direct Contact Membrane Distillation (DCMD) and  Air Gap Membrane Distillation (AGMD) will be used. The sample used is from Shat Al –Arab water (TDS=2430 mg/l). A polyvinylidene fluoride (PVDF) flat sheet membrane was used as a flat sheet form with a plate and frame cell. Several parameters were studied, such as; operation time, feed temperature, permeate temperature, feed flow rate. The results showed that with time, the flux decreases because of the accumulated fouling and scaling on the membrane surface. Feed temperature and feed flow rate had a positive effect on the permeate flux, while permeate temperatu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Taboo Words Vs. Social Deixis: A sociolinguistic Analysis of La Justice or The Cock that Crew: A Play from the Theatre of Ridiculous
...Show More Authors

Linguistic taboos exist in most cultures. Tabooed words are generally being culturespecific
and relating to bodily functions or aspects of a culture that are sacred. Such words are
avoided, considered inappropriate and loaded with affective meaning and failing to adhere to.
Strict rules, often, governing their use and lead to punishment or public shame. These taboo
words can be used as a way of violating social deixis represented by four types of honorifics;
addressee, referent, bystander, and finally setting honorifics. This paper shows how these
taboo words are used in Kenneth Bernard's play La Justice or The Cock that Crew from the
theatre of the Ridiculous as means of violating social deixis in its four types. Th

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
A New Green Approach of CFIA Technique for Direct Assay with a High Throughput of Sulfamethoxazole Drugs Using Condensation Reaction with NQS Agent
...Show More Authors

A new design of manifold flow injection (FI) coupling with a merging zone technique was studied for sulfamethoxazole determination spectrophotometrically. The semiautomated FI method has many advantages such as being fast, simple, highly accurate, economical with high throughput . The suggested method based on the production of the orange- colored compound of SMZ with (NQS)1,2-Naphthoquinone-4-Sulphonic acid Sodium salt in alkaline media NaOH at λmax 496nm.The linearity range of sulfamethoxazole was  3-100  μg. mL-1, with (LOD) was 0.593 μg. mL-1 and the RSD% is about 1.25 and the recovery is 100.73%. All various physical and chemical parameters that have an effect on the stability and development of

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Viral Marketing Technologies on Consumer Behavior _ A survey of a sample of students from the college of administration and economics
...Show More Authors

Abstract:

Viral marketing has become one of the modern strategies adopted by organizations in the marketing of products and services. The idea of viral marketing focuses on the social relations between individuals and groups. As a result of the technological development, most organizations have resorted to using the Internet and its applications and social media to market and promote their products. To reach the largest number of consumers to display their products and services in many ways, including text, audio, visual or video and thus affect the behavior of the consumer.

The problem of the study was the following question (do viral marketing technologies have an impact on consumer behavior?)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Free Convective Heat Transfer with Different Sections Lengths Placed at the Exit of a Vertical Circular Tube subjected to a Constant Heat Flux
...Show More Authors

A free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of

... Show More
View Publication Preview PDF