The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.
Abstract
In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll
... Show MoreAbstract
The research’s goal lies in demonstrating the impact of the Federal Financial Supervision Endowment through the process of auditing the performance of the entities subject to its audit as to improve the performance of these entities, especially if the performance audit method is one of the newly applied methods that are compatible with the standards issued by the International Organization of Financial Supervision and Accounting Institutions which is the method of auditing performance according to the performance evaluation guide for programs and policies issued by the Federal Office of Financial Supervision.
T
... Show MoreHealth service institutions suffer from challenges resulting from the great changes that our world is witnessing today. This has affected the value that these institutions add to the patient.
This research aims to identify the effect of integrating each of the techniques of QFD and value engineering for the health services provided to the patient to improve the value for him and thus obtain his satisfaction, which is reflected in the reputation of the surveyed hospitals. To achieve this, the descriptive analytical method was used, and a questionnaire was designed to collect the necessary data, which represents a measure of this research. The questionnaire was distri
... Show MoreThe purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreAbstract:
This research aims to identify the type of cultural values prevailing in the Ramadi General Hospital, and Baghdad, educational, and whether the organization's culture values play a role in improving the quality of nursing care service in hospitals, and how different cultural values of the nurses between Ramadi Teaching Hospital and General education Baghdad Hospital because of the nature social and cultural Different each region, including the research sample of all nurses working in Baghdad Teaching Hospital, and Ramadi educational-General, adopted Find descriptive analytical approach adopted scale developer (Hofstede, 1991) and (Furrer et al, 2000) And pres
... Show MoreThe main goal of the current research is to know -Environmental problems included in the content of the two science books (chemistry units) for intermediate stage
A list of environmental problems had been prepared and consisting of (8) main areas which are (air and atmosphere pollution, water pollution, soil pollution, energy, disturbance of biodiversity and environmental balance, waste management, food and medicinal pollution, investment of mineral wealth). Of which (60) sub-problems, at that time the researcher analyzed the two science books (two chemistry units) for the intermediate stage of the academic year (2020-2021) in light of the list that was prepared, and the validity and consisten
... Show MoreShowing animal shapes is one of the primary topics since the discovery of cave drawings, with semantic discourses, as they appeared in the ancient civilization of Iraq, with their discourse and intellectual structure, and their reflections on their plastic achievements. The research deals with three topics: the first (an introduction to the concept of discourse), the second: (the historical roots of animal forms), and the third (the manifestation of animal forms and their discourse, in Mesopotamia). Mesopotamian fauna and its concepts? What are the?, Its importance was also represented in: the presence of animals and their semantic and conceptual discourse, especially the sculptures (the lion and the bull), with the aim of revealing the
... Show MoreThe current research is interested in studying the symbol, due to its significant role in the architecture and arts in the holy shrines regardless of their architecture and artistic patterns, through which the symbolic and philosophical connotations insides the holy shrines are revealed. Due to the importance of the topic of the symbol, Almighty God remarked in the holy Quran (He said, "My Lord, make for me a sign." He Said, "Your sign is that you will not [be able to] speak to the people for three days except by gesture. And remember your Lord much and exalt [Him with praise] in the evening and the morning.") (Surat Al-Imran, verse 41). The research consists of two dimensions dealing with symbol and symbolism in its linguistic an
... Show More