Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of SO2 over Modified Activated Carbon in Fixed Bed Reactor: I, Effect of Metal Oxide Loadings and Acid Treatment
...Show More Authors

 

The removal of SO2 from simulated gas stream (SO2 + air) in a fixed bed reactor using Modified Activated Carbon (MAC) catalysts was investigated. All the experiments were conducted at atmospheric pressure, initial SO2 concentration of 2500 ppm and bed temperature of 90oC. MAC was prepared by loading a series of nickel and copper oxides 1, 3, 5, 7, and 10 w

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 05 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
X-Ray Fluorescence Determination of Trace Elements in Vitamin-Mineral Complexes and Medicinal Herbs Using Chemically Modified Polyurethane Foam Sorbents
...Show More Authors

In this paper we proposed the method of X-ray fluorescence (XRF) determination of some essential trace elements in medicinal herbs and vitamin-mineral complexes at the level of 100-101 mg/ml. To increase sensitivity and selectivity of the determination we simple and effective approach based on the extraction of metal ions from aqueous solutions with chemically modified polyurethane foam sorbents followed by direct XRF analysis. The conditions of sorption preconcentration of Co(II), Ni(II) and Zn(II) ions with modified sorbents were optimized. The proposed approach is used for the determination of trace elements in several kinds of medicinal herbs (coltsfoot leaves, nettle leaves and yarrow herb) and vitamin-mineral

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Energetic Parameters Study of Phenol Removal from Aqueous Solution by Electro-Fenton Advanced Oxidation Using Modified Electrodes with PbO2 and Graphene
...Show More Authors

The Electro-Fenton oxidation process is one of the essential advanced electrochemical oxidation processes used to treat Phenol and its derivatives in wastewater. The Electro-Fenton oxidation process was carried out at an ambient temperature at different current density (2, 4, 6, 8 mA/cm2) for up to 6 h. Sodium Sulfate at a concentration of 0.05M was used as a supporting electrolyte, and 0.4 mM of Ferrous ion concentration (Fe2+) was used as a catalyst. The electrolyte cell consists of graphite modified by an electrodepositing layer of PbO2 on its surface as anode and carbon fiber modified with Graphene as a cathode. The results indicated that Phenol concentration decreases with an increase in current dens

... Show More
View Publication Preview PDF
Crossref (13)
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Pharmaceutical Wastewater Treatment Associated with Renewable Energy Generation in Microbial Fuel Cell Based on Mobilized Electroactive Biofilm on Zeolite Bearer
...Show More Authors

In this study, a novel application of lab-scale dual chambered air-cathode microbial fuel cell (MFC) has been developed for simultaneous bio-treatment of real pharmaceutical wastewater and renewable electricity generation. The microbial fuel cell (MFC) was provided with zeolite-packed anodic compartment and a cation exchange membrane (CEM) to separate the anode and cathode. The performance of the proposed MFC was evaluated in terms of COD removal and power generation based on the activity of the bacterial consortium in the biofilm mobilized on zeolite bearer. The MFC was fueled with real pharmaceutical wastewater having an initial COD concentration equal to 800 mg/L and inoculated with anaerobic aged sludge. Results demo

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE OCCURRENCE OF THREE MONOGENEAN PARASITE SPECIES FOR THE FIRST TIME IN IRAQ ON GILLS OF THE COMMON CARP CYPRINUS CARPIO LINNAEUS, 1758 (CYPRINIFORMES, CYPRINIDAE)
...Show More Authors

    The monogeneans Gyrodactylus dzhalilovi Ergens & Ashurova, 1984, G. magnus Konovalov, 1967 and G. matovi Ergens & Kakachava-Avramova, 1966 were recorded in this study for the first time in Iraq from gills of the common carp Cyprinus carpio Linnaeus, 1758 collected from Tigris River in Baghdad city. The description, measurements and illustrations of these parasites were given.

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Physical Education
Building and rationing test to measure the kinetic response to the movement of the player defender basketball junior time
...Show More Authors

The researchers believe the problem of searching the scarcity or limited tests of time kinetic response led to scarcity or limited availability of experimental research in exercises codified within the training curriculum for the junior class, and therefore has been weakening this physical variable as an important episode in the development of the players physical capacities as well as the lack of measure for this variable within the defensive skills in general and the skill of the player movement defender in particular, and it represents the goal of research in the treatment of the above through the construction and rationing test to measure the kinetic response to the movement of the player defender basketball junior time. Chosen as the r

... Show More
Preview PDF
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Assessment of vegetal cover changes using Normalized Difference Vegetation Index (NDVI) and subtractive (NDVI) time-series, Karbala province, Iraq
...Show More Authors

Karbala province regarded one part significant zones in Iraq and considered an economic resource of vegetation such as trees of fruits, sieve and other vegetation. This research aimed to utilize Normalized Difference Vegetation index (NDVI) and Subtracted (NDVI) for investigating the current vegetation cover at last four decay. The Normalized Difference Vegetation Index (NDVI) is the most extensively used satellite index of vegetation health and density. The primary goals of this research are gather a gathering of studied area (Karbala province) satellite images in sequence time for a similar region, these image captured by Landsat (TM 1985, TM 1995, ETM+ 2005 and Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such gap filli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Dentistry Journal
The Role of Social Media in Communication and Learning at the Time of COVID-19 Lockdown—An Online Survey
...Show More Authors

This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
A Survey on Linguistic Interpretation of Facial Expressions and Technologies
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref