The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.
The performance of sewage pumps stations affected by many factors through its work time which produce undesired transportation efficiency. This paper is focus on the use of artificial neural network and multiple linear regression (MLR) models for prediction the major sewage pump station in Baghdad city. The data used in this work were obtained from Al-Habibia sewage pump station during specified records- three years in Al-Karkh district, Baghdad. Pumping capability of the stations was recognized by considering the influent input importance of discharge, total suspended solids (TSS) and biological oxygen demand (BOD). In addition, the chemical oxygen demands (COD), pH and chloride (Cl). The proposed model performanc
... Show MoreThis study introduces a highly sensitive trapezium-shaped PCF based on an SPR refractometric sensor with unique design features. The structure of a sensor was designed and analyzed using COMSOL Multiphysics v5.6 based on Finite Element Method (FEM) with a focus on investigating the influence of various geometric parameters on its performance. The two channels were coated with a metallic gold layer to provide chemical stability, and a thin layer of TiO₂ improved the gold's adhesion to the fiber. The findings indicate that the proposed sensor achieves maximum amplitude and wavelength sensitivities of 1,779 RIU⁻¹ and 30,500 nm/RIU, respectively, with corresponding resolutions of 3.2
Experimental measurements of viscosity and thermal conductivity of single layer of graphene . based DI-water nanofluid are performed as a function of concentrations (0.1-1wt%) and temperatures between (5 to 35ºC). The result reveals that the thermal conductivity of GNPs nanofluids was increased with increasing the nanoparticle weight fraction concentration and temperature, while the maximum enhancement was about 22% for concentration of 1 wt.% at
35ºC. These experimental results were compared with some theoretical models and a good agreement between Nan’s model and the experimental results was observed. The viscosity of the graphene nanofluid displays Newtonian and Non-Newtonian behaviors with respect to nanoparticles concen
In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf
... Show MoreCleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef
... Show MoreBaghdad city has been faced numerous issues related to freshwater environment deteriorations due to many reasons, mainly was the discharge of wastewater without adequate treatment. Al-Rustamiya Wastewater Treatment Plant (WWTP) have been constructed among many plants in Baghdad city to reduce the amount of wastewater discharged into natural environment and its subsequent adverse effects. This study was conducted to evaluate the performance of the plant which consist of a conventional activated sludge (CAS) and sequencing batch reactors (SBR) systems as secondary treatment units and its ability to meet Iraqi specifications. A reliability level determination and analysis also were conducted to find the plant's stability an
... Show MoreDetecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More