The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.
نتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول
... Show MoreHigh frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreDespite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit
... Show MoreIn this study, the upgrading of Iraqi heavy crude oil was achieved utilizing the solvent deasphalting approach (SDA) and enhanced solvent deasphalting (e-SDA) by adding Nanosilica (NS). The NS was synthesized from local sand. The XRD result, referred to as the amorphous phase, has a wide peak at 2Θ= (22 - 23º) The inclusion of hydrogen-bonded silanol groups (Si–O–H) and siloxane groups (Si–O–Si) in the FTIR spectra. The SDA process was handled using n-pentane solvent at various solvent to oil ratios (SOR) (4-16/1ml/g), room and reflux temperature, and 0.5 h mixing time. In the e-SDA process, various fractions of the NS (1–7 wt.%) have been utilized with 61 nm particle size and 560.86 m²/g surface area in the presence of 12 m
... Show MoreAbstract
The aim of this research is to determine how well the Cubing Technique affects the Iraqi EFL students' composition writing, vocabulary, and meta-cognitive awareness of writing strategies. The sample of (64) secondary-school female students in the fifth grade is drawn from two classrooms and split into two equal groups: the experimental group and the control group, each of which consists of (32) students. A quasi-experimental design is applied. The performance test and Meta-cognitive Writing Strategies questionnaire are given as a pre-test for equalizing the two groups after ensuring their validity and reliability. Then, they are administrated as a posttest in both groups. According to the results, the si
... Show MoreThe aim of this research is to apply the concept of total value management to improve the process design of producing the toothpaste in Al Mammon factory one of the in the general company of food industry. The concept of total value management is concerning with achieve more than one values which are important for the customers as these values are related to the customers satisfaction. The research problem is that the factory did not measure the effectiveness of process design as this company has weakness in analyzing this effectiveness in synchronies with total value management. On the other side, the company did not give more attention to the cost of products and selling prices within the value cost/ profit which is one of the
... Show Moreيهدف البحث الى تطبيق إدارة القيمة االجمالية في تحسين تصميم عملية أنتاج معجون االسنان في مصنع المامون التابع للشركة العامة للمنتوجات الغذائية. وقد تمثلت مشكلة البحث في أن الشركة المبحوثة ال تقوم بقياس فاعلية تصميم العمليات فهي تعاني من ضعف في تحليل فاعلية تصميم العمليات في إطار مت ازمن مع أسلوب تطبيق إدارة القيمة االجمالية ، فضالً عن عدم اعطاء االنتباه الكافي لموضوع كلف المنتجات واسعار البيع ضمن ما يسمى بقيم
... Show More