Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Pyogenic Discitis in Female after Delivery and Pelvic Surgery
...Show More Authors

Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Partial Purification and Characterization of Catalase from Banana Peels
...Show More Authors

Catalase (EC 1.11.1.6) is a well known enzyme which exists in almost all living creatures exposing to oxygen (such as plants, bacteria, and animals). It is a very necessary enzyme to protect the cell from oxidative detriment by reactive oxygen species (ROS). The aim of this study is the partial purification and characterization of Catalase enzyme from Banana peels. In this study, fresh banana peels are treated with 70 % ethanol ,further separated with chloroform ,water and ethyl acetate respectively .The supernatant of the enzymatic sample which is treated with chloroform is loaded into gel filtration column with Sephadex G-100 (1.0 x 90 cm) equilibrated with pH7 buffer media (phosphate buffer 0.1 M). Kinetic studies of the purified en

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Roseomonas gilardii NCTC 13290 Strain Pigment Extraction and Characterization
...Show More Authors

Introduction: The study was intended for Roseomonas gilardii NTCC 13290 strain pigment extraction and characterization. Methodology: The pigment-producing bacterial were cultured on Columbia blood agar and nutrient media agar. Then the pigments were extracted by ethanol. The candidate pigment was further characterized by different biotechnological techniques: UV-Vis spectroscopy, FT-IR to analyze the functional group of the targeted pigment, and TLC media. Results: The cultivation of Roseomonas gilardii on media showed pink color and nearly runny texture. The bacterial colonies were microscopically gram stained and examined, the R. gilardii was seen as coccobacillus colonies that mostly form pairs arranged as short chains. The R. gilardii b

... Show More
View Publication
Clarivate Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Synthesis and electrical properties of conductive polyaniline/ SWCNT nanocomposites
...Show More Authors

The synthesis of conducting polyaniline (PANI) nanocomposites containing various concentrations of functionalized single-walled carbon nanotubes (f-SWCNT) were synthesized by in situ polymerization of aniline monomer. The morphological and electrical properties of pure PANI and PANI/SWCNT nanocomposites were examined by using Fourier transform- infrared spectroscopy (FTIR), and Atomic Force Microscopy (AFM) respectively. The FTIR shows the aniline monomers were polymerized on the surface of SWCNTs, depending on the -* electron interaction between aniline monomers and SWCNTs. AFM analysis showed increasing in the roughness with increasing SWCNT content. The AC, DC electrical conductivities of pure PANI and PANI/SWCNT nanocomposite h

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Political Sciences Journal
International and domestic political conflicts in south Yemen1869-1918
...Show More Authors

In the South of yement, when the accupation of Aden in 1839 by the British, British politics has proceeded in accordance with interests in promoting the existence and exploitation of this important site to implement their interests. Historians believe that Britain played a major role in the conflicts that have taken place on the land of Yemen, through a series of military and political dealings between them and the Ottoman Empire prior to withdrawal of Yemen and between local authorities and power to Yemen, such interactions have led to very serious consequences for the future of Yemen and Yemen was often divided into three parts, the northern areas under the authority of Imam Yahya, and the South, under the control of Britain, Asir and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study and Analysis the Mathematical Operations of Fuzzy Logic
...Show More Authors

The last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Wed Dec 01 2021
Journal Name
Journal Of International Studies
Emergence and developing united Arab of Emirates nuclear program
...Show More Authors

United Arab of Emirates made efforts in developing workforce in the field of nuclear energy that it had a chance to attract specialized of this field that it reflect growth in every field of life through which it take special procedures to face casas as fokoshima .the state had started to apply the UAE peaceful nuclear program by opening (Baraka)station in 2010 as to be the first in the Arab world to aim to enhance and diversification energy sources of electricity there in addition to enhance the state’s efforts to achieve economic refreshing and environmental protect.

View Publication Preview PDF
Publication Date
Mon Oct 04 2021
Journal Name
Palarch’s Journal Of Archaeology Of Egypt
GEORGE MASON AND THE VIRGINIA BILL OF RIGHTS 1776
...Show More Authors

After the persistence of the British policy of oppression and control over the American colonies and the attempts to obliterate the identity of their inhabitants, the colonies worked on moving forward towards achieving independence, and Virginia was the first to initiate the development of the new government frameworks, through George Mason in drafting the Virginia Bill of Rights in 1776, which expressed the philosophy of the era Enlightenment and independent revolutionary thought, which called for equality and natural rights for individuals and the need for a free popular government that works for the common good.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
Duality of St-closed submodules and semi-extending modules
...Show More Authors

The main goal of this paper is to dualize the two concepts St-closed submodule and semi-extending module which were given by Ahmed and Abbas in 2015. These dualizations are called CSt-closed submodule and cosemi-extending mod- ule. Many important properties of these dualizations are investigated, as well as some others useful results which mentioned by those authors are dualized. Furthermore, the relationships of cosemi-extending and other related modules are considered.

View Publication Preview PDF
Scopus (2)
Scopus