Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 18 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE APPLICITIONS OF JUST IN TIME PRODUCTION AND ITS ROLE ON THE COMPONENTS OF MARKETING INFORMATION SYSTEM: AN APPLIED STUDY IN ALMANSOUR OUR STATE COMPANY FOR CONSTRUCTIONAL CONTRACTS.: THE APPLICITIONS OF JUST IN TIME PRODUCTION AND ITS ROLE ON THE COMPONENTS OF MARKETING INFORMATION SYSTEM: AN APPLIED STUDY IN ALMANSOUR OUR STATE COMPANY FOR CONSTRUCTIONAL CONTRACTS.
...Show More Authors

Live the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
A Comparative Study between Conventional Pap Smear and Liquid-Based Cytology: A Clinco-Cytological Study of Iraqi Women with Some Health Problems of Cervix
...Show More Authors

A cervical screening by Pap test is necessary in recognizing precancerous and cancerous cases to reduce mortality due to cervical cancer among women. Regular screening and follow up can make it easier to early diagnose and eventually, to treat and control cervical cancer.

    This study aimed to detect atypical pathological changes of the vagina and uterine cervix of a sample of Iraqi women by macro- and micro-examination, and to determine the link with the demographic features. Also the study aimed to evaluate the two Pap smear techniques; the conventional and the base liquid methods.

     The study included 50 women with genital health problems (18-50 years old) who were referred to&nb

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Transient Stability Enhancement and Critical Clearing Time Improvement for Kurdistan Region Network using Fact Configuration
...Show More Authors

The Electrical power system has become vast and more complex, so it is subjected to sudden changes in load levels. Stability is an important concept which determines the stable operation of the power system. Transient stability analysis has become one of the significant studies in the power system to ensure the system stability to withstand a considerable disturbance. The effect of temporary occurrence can lead to malfunction of electronic control equipment. The application of flexible AC transmission systems (FACTS) devices in the transmission system have introduced several changes in the power system. These changes have a significant impact on the power system protection, due to differences inline impedance, line curre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Rapid Direct Detection and Differentiation of Mycobacterium tuberculosis complex in Sputum by Real-Time PCR
...Show More Authors

Tuberculosis status as the second leading causes of significant morbidity and mortality from an infectious disease worldwide, after human immunodeficiency virus (HIV). Sample collection was conducted at the Institute of Chest and Respiratory Diseases/Baghdad Medical City in Baghdad. The collection interval was from August to October 2014, 629 suspected TB patients were examined during this period. The results revealed among total 629 specimens, 56 (8.9%) of the specimens were positive by direct examination and 573 (91.1%) negative specimens by smear microscopy. Fifty six DNA samples were extracted from positive ZN smears of sputum specimens and 40 samples from healthy persons (as control) were subjected to molecular diagnosis by real tim

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 16 2021
Journal Name
International Journal For Computational Methods In Engineering Science And Mechanics
Determination of time-dependent coefficients in moving boundary problems under nonlocal and heat moment observations
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adsorption of Methyl Violet Dye from Aqueous Solution by Iraqi Bentonite and Surfactant – Modified Iraqi Bentonite
...Show More Authors

Natural bentonite (B) mineral clay was modified by anionic surfactant sodium dodecyl sulfate (SDS) and characterized using different techniques such as: FTIR spectroscopy, scanning electron microscopy (SEM) and X-Ray diffraction (XRD). The bentonite and modified bentonite were used as adsorbents for the adsorption of methyl violet (MV) from aqueous solutions. The adsorption study was carried out at different conditions such as: contact time, pH value and adsorbent weight. The adsorption kinetic described by pseudo– first order and pseudo – second order equilibrium experimental data described by Langmuir, Freundlich and Temkin isotherm models. The thermodynamic parameters standard free energy ( ), standard entropy ( ) standa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Potential Application of Natural and Modified Orange Peel as an Eco‒friendly Adsorbent for Methylene Blue Dye
...Show More Authors

In this paper, the adsorption behavior of Methylene blue dye by orange peels, which was chemically modified with sodium hydroxide, has been investigated. Physical and chemical properties of both sorbents under study were determined using Fourier Transform Infrared Spectrophotometer (FTIR), Scanning Electron Microscope (SEM), Atomic Force Microscope (AFM) and Brunauer, Emmett and Teller (BET) specific surface-area measurement techniques. Effect of the solution‒pH, adsorbent dose, adsorption time, temperature and initial methylene blue concentration were studied in batch experiments. The experimental data were fitted into the following kinetic models: pseudo-first order, pseudo-second order, and the intraparticle diffusion model. It was

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus Crossref