The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is now the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the robust system. In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several manipulations are made on compactness information for these two images to get a unique key for each person. The generated random key can be used for electronic numbers, passport identification, civil identification card, and it could be used as seeds for pseudo-random number generators. The multi-biometric system operates on two images, faces and fingerprints, by partitioning each image into four parts and taking the highest density for each one, XOR these parts; diffusions process is applied on these parts including permutation and thresholding to produce a random key. The generated key cannot be revocable that passed through randomness tests to ensure whether the generated key is accepted as true. Thus, the results of the tests are passed and presented that all generated keys are accepted to be random and unpredictable binary sequences and hence they can be used efficiently.
The current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless steel
... Show MoreThe current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless st
... Show MoreA specialized irradiation instrument "created instrument" was designed and created from various kinds and sizes of available plastic household-waste materials. In addition, a neutron beam collimator with a lid was designed and implemented. The collimator is with dimensions of 25 cm in height and 10 cm in inner diameter, while the lid dimensions are 11.5 cm height and outer diameter of 9.9 cm to perfectly match the inner diameter of the collimator with the possibility of movement (opening and closing), and also the shielding of the radioactive 241Am/Be neutron source with a recent activity of 37.5 mCi.
To investigate the efficiency of the "created instrument", ten hydrogenous material samples (ordinary p
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreAtmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
The aim of this paper is to find a new method for solving a system of linear initial value problems of ordinary differential equation using approximation technique by two-point osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0, 1] and compared the results with conventional methods and is shown to be that seems to converge faster and more accurately than the conventional methods.
objective the research to diagnosis and interpretation of the nature of the correlation between the basic elements of knowledge management (tecgnology , structure , culture , process , human resource ) and the strategic performance of the Iraqi private banks, the research community and the level dimensions, and tested this research in the private banking sector represented by (7), especially in Baghdad city, Iraqi banks, and applied on sample consisting of 100 distributors in several administrative levels Director (Director, Director of the department, branch manager), and use questionnaire Head to collect data and information tool, and some private banks annual reports, has sought research to test a number of h
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of
... Show More