Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
The Effect of Vitamin A on Testis Weight and Sexual Glands on Albino Male Mice Treated with Hexavalent Chromium
...Show More Authors

This study was conducted to determine the effect of vitamin A ( 10 mg/kg ) on avearage testis weight and sexual glands ( Prostate and Seminal Vesicle ) for albino male mice treated with Hexavalent chromium ( 1000 ppm ) .The current study 40 mice were divided into fife groups : 1st group treated with distilled water and considered an control group (C) / the 2nd group treated with sesame oil ( T1) / 3rd group was givin hexavalent chromium ( 1000 ppm ) (T2) / 4th group treated with vitamin A ( 10 mg / kg ) and exposed to hexavalent chromium ( 1000 ppm ) (T3) / 5th group treated with vitamin A ( 10 mg kg ) (T4) . The expermint lasted 35 day . the results showed a significant ( P ? 0.05 ) decrease in avearage testis weight and sexual glan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Nasaq Journal
Social Media and Language Evolution: A Review of Current Theoretical Efforts on Communication and Language Change
...Show More Authors

This article is an endeavour to highlight the relationship between social media and language evolution. It reviews the current theoretical efforts on communication and language change. The descriptive design, which is theoretically based on technological determision, is used. The assumption behind this review is that the social media plays a significant role in language evolution. Moreover, different platforms of social media are characterized by being the easiest and fastest means of communication. It concludes that the current theoretical efforts have paid much attention to the relationship between social media and language evolution. Such efforts have highlighted the fact that social media platforms are awash with a lot of acronyms, cybe

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 03 2024
Journal Name
Nasaq
Types and functions of comparisons (based on Russian and Arabic phraseological units) Типы и функции сравнений (на материале русских и арабских фразеологизмов) انواع ووظائف المقارنات )في االمثال الروسية والعربية
...Show More Authors

Comparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russia

... Show More
Publication Date
Sat Sep 01 2012
Journal Name
Australian Journal Of Basic And Applied Sciences
Electrochemical interferences of Mn<sup>2+</sup> with Hg<sup>2+</sup>, Cd<sup>2+</sup> and Cu<sup>2+</sup> at different modified GCE
...Show More Authors

Glassy carbon electrode (GCE) was modified with carbon nanotubes CNT and C60 by attachment and solution evaporation techniques, respectively. CNT/Li+/GCE and C60/Li+/GCE were prepared by modifying CNT/GCE and C60/GCE in Li+ solution via cyclic voltammetry (CV) potential cycling. The sensing characteristics of the modified film electrodes, demonstrated in this study for interference of Mn2+ in different heavy metals ion esp. Hg2+, Cd2+ and Cu2+. The interfering effect was investigated that exert positive interference on the redox peaks of Mn2+. The modification of GCE with nano materials and Li+ act an enhancement for the redox current peaks to observe the effect of interference for Mn2+ in 1:1 ratio with different heavy metals ion.

Scopus (3)
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
European Journal Of Biology And Medical Science Research
Impact of an educational intervention of training of breast feeding promoting on the knowledge and attitude of a sample of mothers: a study of a pre and post evaluation.
...Show More Authors

Background: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.

Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Influence of Coating with Some Natural Based Materials on the Erosion Wear Behavior of Glass Fiber Reinforced Epoxy Resin
...Show More Authors

Abstract 

In the present study, composites were prepared by Hand lay-up molding. The composites constituents were epoxy resin as a matrix, 6% volume fractions of glass fibers (G.F) as reinforcement and 3%, 6% volume fractions of preparation natural material (Rice Husk Ash, Carrot Powder, and Sawdust) as filler. Studied the erosion wear behavior and coating by natural wastes (Rice Husk Ash) with epoxy resin after erosion. The results showed the non – reinforced epoxy have lower resistance erosion than natural based material composites and the specimen (Epoxy+6%glass fiber+6%RHA) has higher resistance erosion than composites reinforced with carrot powder and sawdust  at 30cm , angle 60

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Analysis Based on Well Logging Data for Tight Carbonate Reservoir: The SADI Formation Case in Halfaya Oil Field
...Show More Authors

Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
The Numerical Technique Based on Shifted Jacobi-Gauss-Lobatto Polynomials for Solving Two Dimensional Multi-Space Fractional Bioheat Equations
...Show More Authors

This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 28 2019
Journal Name
Al-khwarizmi Engineering Journal
Heuristic D* Algorithm Based on Particle Swarm Optimization for Path Planning of Two-Link Robot Arm in Dynamic Environment
...Show More Authors

 Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved.  In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)

... Show More
View Publication Preview PDF
Crossref (7)
Crossref