The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.
The basic idea of the Main Outfall Drain, MOD, was to construct a main channel to collect saline drained water of the irrigation projects within central and southern parts of Iraq and discharge it down to the Arabian Gulf. The MOD has a navigation lock structures near Addalmage Lake at station 299.4km. This structure is designed to ensure navigation within the MOD. The water level difference upstream the cross regulator and the downstream conjugation structure is about 9m. This head difference can be used to generate electrical power by constricting a low head power plant. This study aimed to utilize the head difference in navigation lock structures for power generation. Different operation condition an
... Show MoreZnO organic hybrid junction (electroluminescence EL device) was fabricated using phase segregation method. ZnO-nanoparticle (NPs) was prepared as a colloidal by self–assembly method of Zinc acetate solution with KOH solution. Nanoparticle is employed to form organic-inorganic hybrid film and generate white light emission, while N,N’–diphenyl-N,N’ –bis(3-methylphenyl)-1,1’-biphenyl 4,4’-diamine (TPD) and polymethyl methacrylate (PMMA) are adopted as the organic matrices. ZnO NPs was used to fabricate TPD: PMMA: ZnO NPs hybrid junction device. The photoluminescence (PL) and electroluminescence (EL) spectra of the TPD: PMMA: ZnO NPs hybrid device provided a broad emission band covering entirely the visible spectrum (∼350-∼700
... Show MoreIn the field of construction project management, time and cost are the most important factors to be considered in planning every project, and their relationship is complex. The total cost for each project is the sum of the direct and indirect cost. Direct cost commonly represents labor, materials, equipment, etc.
Indirect cost generally represents overhead cost such as supervision, administration, consultants, and interests. Direct cost grows at an increasing rate as the project time is reduced from its original planned time. However, indirect cost continues for the life of the project and any reduction in project time means a reduction in indirect cost. Therefore, there is a trade-off between the time and cost for completing construc
Brainstorming has been a common approach in many industries where the result is not always accurate, especially when procuring automobile spare parts. This approach was replaced with a scientific and optimized method that is highly reliable, hence the decision to optimize the inventory inflation budget based on spare parts and miscellaneous costs of the typical automobile industry. Some factors required to achieve this goal were investigated. Through this investigation, spare parts (consumables and non-consumables) were found to be mostly used in Innoson Vehicle Manufacturing (IVM), Nigeria but incorporated miscellaneous costs to augment the cost of spare parts. The inflation rate was considered first due to the market's
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
This paper proposes a novel meta-heuristic optimization algorithm called the fine-tuning meta-heuristic algorithm (FTMA) for solving global optimization problems. In this algorithm, the solutions are fine-tuned using the fundamental steps in meta-heuristic optimization, namely, exploration, exploitation, and randomization, in such a way that if one step improves the solution, then it is unnecessary to execute the remaining steps. The performance of the proposed FTMA has been compared with that of five other optimization algorithms over ten benchmark test functions. Nine of them are well-known and already exist in the literature, while the tenth one is proposed by the authors and introduced in this article. One test trial was shown t
... Show More