As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree of protection to secure personal user transactions by creating secure keys that can be used for insecure channels.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreTracking moving objects is one of a very important applications within the computer vision. The goal of object tracking is segmenting a region of interest from a video scene and keeping track of its motion and positioning. Track moving objects used in many applications such as video surveillance, robot vision, and traffic monitoring, and animation. In this paper a four-wheeled robotic system have been designed and implemented by using Arduino-Uno microcontroller. Also a useful algorithms have been developed to detect and track objects in real time. The main proposed algorithm based on the kernel based color algorithm and some geometric properties to tracking color object. Robotic system is a compromise of two principal parts which are th
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
DBNRSK Sayed, Journal of Strategic Research in Social Science (JoSReSS), 2020
News headlines are key elements in spreading news. They are unique texts written in a special language which enables readers understand the overall nature and importance of the topic. However, this special language causes difficulty for readers in understanding the headline. To illuminate this difficulty, it is argued that a pragmatic analysis from a speech act theory perspective is a plausible tool for a headline analysis. The main objective of the study is to pragmatically analyze the most frequently employed types of speech acts in the news headlines covering COVID-19 in Aljazeera English website. To this end, Bach and Harnish's (1979) Taxonomy of Speech Acts has been adopted to analyze the data. Thirty headlines have been collected f
... Show MoreSummed up the idea of this research in an attempt to find the establishment of the knowledge convergence to show the features of verbal acts that occurred a prime location in the lesson deliberative theory book unique contract ( IbnAbdRabbaAndalusian ) to prove that Arabic was the old literary studies included many of the features of this theory in both theoretical and practical
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThe DEM (Digital elevation model) means that the topography of the earth's surface (such as; Terrain relief and ocean floors), can be described mathematically by elevations as functions of three positions either in geographical coordinates, (Lat. Long. System) or in rectangular coordinates systems (X, Y, Z). Therefore, a DEM is an array number that represents spatial distributions of terrain characteristics. In this paper, the contour lines with different interval of high-resolution digital elevation model (1m) for AL-khamisah, The Qar Government was obtained. The altitudes ranging is between 1 m – 8.5 m, so characterized by varying heights within a small spatial region because it represents in multiple spots with flat surfaces.