The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.
The function of internal auditing has become an important function that aims at achieving objectives that are compatible with these developments and changes that have occurred in many countries in the world, which required the emergence of professional associations and institutes in the profession of internal auditing. Improve the guideline of the internal audit units issued by the Federal Audit Bureau to enhance the efficiency of internal audit performance in Iraqi government units. The researchers adopted the statistical method of proving the hypothesis by constructing a questionnaire that included three main axes: supporting the senior management in adopting the current guide, and the second being the importance of improving t
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThe enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%. The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreThe preparation of activated carbon (AC) from date stones by using microwave assisted K2CO3 activation was investigated in this paper. The influence of radiation time, radiation power, and impregnation ratio on the yield and methylene blue (MB) uptake of such carbon were studied. Based on Box-Wilson central composite design, two second order polynomial models were developed to correlate the process variables to the two responses. From the analysis of variance the significant variables on each response were identified. Optimum coditions of 8 min radiation time, 660 W radiation power and 1.5 g/g impregnation ratio gave 460.123 mg/g MB uptake and 19.99 % yield. The characteristics of the AC were examined by pore structure analysis, and scan
... Show MoreA new (Reversed Phase- High Performance Liquid chromatography) RP-HPLC method with Ultraviolet-Visible spectrophotometry has been optimized and validated for the simultaneous extraction and determination of antioxidants present in Iraqi calyces of Hibiscus Sabdraffia Linn. The method is based on using ultrasonic bath for extracting antioxidants. Limit of detection in μg/ml of Vitamin C, Sabdaretine, Gossypetine, Hibiscetine, Anthocyanins, Dephinidin-3-glucoside were113.8294×10-6,123.0453×10-6,70.3681×10-6,59.6730×10-6,148.1710×10-6,and125.3481×10-6 respectively. The concentration of antioxidants found in dry spacemen of calyces of Iraqi Hibiscus Sabdraffia Linn. under study: Vitamin C, Sabdaretine, Gossypetine, Hibiscetine, Anthoc
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who hav
... Show More