Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe topic of this research deals with an analytical study of the nature of the visual sent by the sculptural monument of the person of Christ around the world, the nature of this monument, the manner of its embodiment, the mechanism of reception for each of the societies that this monument addressed to them, how it was reflected on them, how it was reflected on them, and whether these works are related to their culture or not, I discussed this study All this, and the researcher has established theoretical research axes for the research according to the desired goal of this study, which is the definition of the mechanism of visual discourse of statues of Christ around the world and were as follows: (The first axis: the discourse and visua
... Show MoreDiabetic nephropathy (DN) is the most common microvascular complication that may lead to chronic renal failure in diabetic patients. Till now microalbuminuria, with its restrictions, is the early marker of DN, appeared after the disease exacerbation. Thus, new biomarkers are required to predict the early onset of DN before the appearance of microalbuminuria. The aim of this study is to investigate the possible use of uVDBP in the early prediction of DN. Fifty diabetic patients with DN and 40 diabetic patients without DN for both types of diabetes were enrolled in this study. All patients were tested for uACR, uVDBP (measured by ELISA), and blood HbA1c. The results demonstrated a highly significant elevation of uAC
... Show More The theory of the epic theater has received wide attention by filmmakers around the world because of its great impact on the artistic work of the theater and its relationship with societies, and among these directors the Iraqi directors have been influenced by the epic theater and its applications in the show.
In order to find out the effectiveness of these influences on the Iraqi director, I found the need to do this study, which was divided into an introduction and a theoretical framework that included two topics. The first topic (Philosophical References and the Intellectual Foundations of the Epic Theater Theory) deals with the philosophical foundations that crystallized the epic theory of Burch and the mechanism of working
Background: obesity is a major global health problem with more than 200 million obese men and almost 300 million obese women. Melatonin is a well-known molecule for its involvement in circadian rhythm regulation and has multiple pathological actions including control of appetite, sleep wake cycle and metabolic syndrome.
Aim: to estimate the effect of melatonin supplements on obese patients on a calorie restricted diet in comparison to patients on lifestyle measures only in the form of weight loss, waist circumference and sleep quality.
Subjects and Method: one hundred patients with body mass index > 24 were collected, fifty patients were starte
... Show Moresilver nanoparticle which synthesized by.
Herein, the interfacial polymerization method has been used for the synthesis of PPy/NaVO3 composites with different compositions of NaVO3 (10 %, 20 %, 30 %, 40 % and 50 %) as an efficient electrode material for supercapacitors. The successful formation and composition of the as-prepared composites (PV1-PV5) were confirmed by FTIR, XRD, EDX, and SEM analysis. The electrochemical properties were investigated by cyclic voltammetry (CV), galvanometric charge–discharge measurement (GCD), and electrochemical impedance spectroscopy (EIS) in 0.5 M H2SO4 electrolyte. As compared to other, the PV4 composite exhibit excellent specific capacitance of 391 F g−1 at a current density of 0.75 A/g with good cycling stability of ∼59 % after 1000 cycle
... Show More