Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
In this article, the influence of group nano transition metal oxides such as {(MnO2), (Fe2O3) and (CuO)} thin films on the (ZnO-TiO2) electric characteristics have been analyzed. The prepared films deposited on glass substrate laser Nd-YAG with wavelength (ℷ =1064 nm) ,energy of (800mJ) and number of shots (400). The density of the film was found to be (200 nm) at room temperature (RT) and annealing temperature (573K).Using DC Conductivity and Hall Effect, we obtained the electrical properties of the films. The DC Conductivity shows that that the activation energies decrease while the σRT at annealing temperature with different elements increases the formation of mixed oxides. The Hall effect, the elec
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreThe chemical composition of wastes of pressed grapes and found that the main components of wastes of pressed grapes, represented by the percentage of moisture was 6.47%, and the proportions are 3.71%. Either carbohydrates amounted to 85.77 %, either in fat models using petroleum ether Petroleum ether) was the increase of 0.27%. estimated the percentage of ash in the sampls was 3.78%, either fiber reached 69.47 %,, in addition to the test extracts towards the growth of seven types of bacteria, which included Bacillus subtilis, Bacillus cereus, Bacillus stearothermophilus, Escherishia coli, Staphylococcus aureus, Salmonella typhimurium and Pseudomonas fluorescens and yeast Candida albicans and Kluyveromyces marxianus, ( diffusion method ).
... Show MoreNowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s
... Show MoreThis study seeks to address the impact of marketing knowledge dimensions (product, price, promotion, distribution) on the organizational performance in relation to a number of variables which are (efficiency, effectiveness, market share, customer satisfaction), and seeks to reveal the role of marketing knowledge in organizational performance.
In order to achieve the objective of the study the researcher has adopted a hypothetical model that reflects the logical relationships between the variables of the study. In order to reveal the nature of these relationships, several hypotheses have been presented as tentative solutions and this study seeks to verify the validity of these hypotheses.
... Show MoreThe current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreBackground: The study was designed for the assessment of the knowledge of medical students regarding pandemics. In the current designed study, the level of awareness was checked and the majority of students were found aware of SARS-CoV and SARS-Cov2 (Covid-19).
Objective: To assess the awareness of SARS-CoV and SARS-Cov2 (Covid-19) among medical students of Pakistan.
Subjects and Methods: A cross-sectional survey was carried out in different universities of Pakistan from May to August 2020. A self-constructed questionnaire by Pursuing the clinical and community administration of COVID-19 given by the National Health Commission of the People's Republic of China was used am
... Show More