Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.
The Turkish intervention in the Libyan crisis in the recent period was a trigger for more tension than a solution - as Turkey claims - as Turkey seeks to quickly set a welcome military footing in Libya to prevent the reconciliation government from falling and planning to start exploration for gas and oil in Libya to solve the Turkish energy crisis, that is, the energy exchange for security and trying to exploit the situation to establish a new gathering of proTurkish political Islam, as for the Iranian position on the Libyan crisis, it does not exceed a logistical role and provide Turkey with expertise in circumventing international sanctions and assisting it in transporting fighters and weapons to Libya, Iran has also deliberately added so
... Show MoreThe present study focused mainly on the analysis of stiffened and unstiffened composite laminated plates subjected to buckling load. Analytical, numerical and experimental analysis for different cases has been considered. The experimental investigation is to manufacture the laminates and to find mechanical properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus. The compressive test was carried to find the critical buckling load of plate. The design parameters of the laminates such as aspect ratio, thickness ratio, boundary conditions and number of stiffeners were investigated using high order shear deformation theory (HOST) and Finite element coded by ANSYS .The main conclusion was the buckling load c
... Show MoreThe main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show MoreDegenerate parabolic partial differential equations (PDEs) with vanishing or unbounded leading coefficient make the PDE non-uniformly parabolic, and new theories need to be developed in the context of practical applications of such rather unstudied mathematical models arising in porous media, population dynamics, financial mathematics, etc. With this new challenge in mind, this paper considers investigating newly formulated direct and inverse problems associated with non-uniform parabolic PDEs where the leading space- and time-dependent coefficient is allowed to vanish on a non-empty, but zero measure, kernel set. In the context of inverse analysis, we consider the linear but ill-pose
The goal of this discussion is to study the twigged of pure-small (pr-small) sub- moduleof a module W as recirculation of a small sub-module, and we give some basic idiosyncrasy and instances of this kind of sub-module. Also, we give the acquaint of pure radical of a module W (pr-radical) with peculiarities.
The overlap between science and knowledge is a feature of the 21st century. This integration, which crosses the traditional boundaries between academic disciplines, has occurred because of the emergence of new needs and new professions. This overlap has overshadowed the arts in general and design in particular. The Design achievements have not been far away from the attempts of integration of more than one type or design application to produce new outputs unique in its functional and aesthetic character, including the terms of internal graphic design.
The researcher raises the question of the functional dimension of graphic design in the internal space, in order to answer it through the methodological framework, which includes th
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show More