The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.
Widespread COVID-19 infections have sparked global attempts to contain the virus and eradicate it. Most researchers utilize machine learning (ML) algorithms to predict this virus. However, researchers face challenges, such as selecting the appropriate parameters and the best algorithm to achieve an accurate prediction. Therefore, an expert data scientist is needed. To overcome the need for data scientists and because some researchers have limited professionalism in data analysis, this study concerns developing a COVID-19 detection system using automated ML (AutoML) tools to detect infected patients. A blood test dataset that has 111 variables and 5644 cases was used. The model is built with three experiments using Python's Auto-
... Show MoreThe distribution of chilled water flow rate in terminal unit is an important factor used to evaluate the performance of central air conditioning unit. A prototype of A/C unit has been made, which contains three terminal units with a complete set of accessories (3-way valve, 2-way valve, and sensors) to study the effect of the main parameters, such as total water flow rate and chilled water supply temperature with variable valve opening. In this work, 40 tests were carried out. These tests were in two groups, 20 test for 3-way valve case and 20 test for 2-way valve case. These tests were performed at three levels of valve opening, total water flow rate and water supply temperature according to the design matrices establis
... Show MoreIn this paper, certain types of regularity of topological spaces have been highlighted, which fall within the study of generalizations of separation axioms. One of the important axioms of separation is what is called regularity, and the spaces that have this property are not few, and the most important of these spaces are Euclidean spaces. Therefore, limiting this important concept to topology is within a narrow framework, which necessitates the use of generalized open sets to obtain more good characteristics and preserve the properties achieved in general topology. Perhaps the reader will realize through the research that our generalization preserved most of the characteristics, the most important of which is the hereditary property. Two t
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreWater harvesting techniques developed globally during the last decades with highly increasing water crisis and climate changes. The Yeoman keyline method was spread widely with increased use for sustainable permaculture development. The main aim of the current study is to analyze and solve the siltation problem in Dwerige weir and to develop water resources in the basin area. The remote sensing data, field surveying, and hydrology are used together to build a new geotechnical approach. The results show that a huge siltation quantity was not considered in the weir design studies, which were represented by sand sheet materials and eroded soils washed by flooding and entering the weir reservoir through four main channels. The t
... Show MoreSimple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. A
... Show MoreCyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreIn this paper, the main work is to minimize a function of three cost criteria for scheduling n jobs on a single machine. We proposed algorithms to solve the single machine scheduling multiobjective problem. In this problem, we consider minimizing the total completion times, total tardiness and maximum tardiness criteria. First a branch and bound (BAB) algorithm is applied for the 1//∑Ci+∑Ti+Tmax problem. Second we compare two multiobjective algorithms one of them based on (BAB) algorithm to find the set of efficient (non dominated) solutions for the 1//(∑Ci ,∑Ti ,Tmax) problem. The computational results show that the algorithm based on (BAB) algorithm is better than the other one for generated the total number of
... Show MoreThis paper investigates the simultaneous recovery for two time-dependent coefficients for heat equation under Neumann boundary condition. This problem is considered under extra conditions of nonlocal type. The main issue with this problem is the solution unstable to small contamination of noise in the input data. The Crank-Nicolson finite difference method is utilized to solve the direct problem whilst the inverse problem is viewed as nonlinear optimization problem. The later problem is solved numerically using optimization toolbox from MATLAB. We found that the numerical results are accurate and stable.