Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Background: Cerebral palsy is non-progressive disorder of posture or movement due to a lesion of the developing brain. It is the commonest physical disability in childhood. Objective: To study the clinical, neurological abnormalities, prevalence of convulsion (epilepsy) & to asses the value of CT scans of brain in patients with cerebral palsy.
Background: Toxoplasma gondiiis an obligate intracellular protozoan that may infect nearly all warm-blooded animals, including humans. T gondiiis thought to infect one-third of the human population.The symptoms depending on the adequacy of the immune antiparasitic response. In humans, the main source of infection is through contact with the feces of infected cats, the final host in which the T. gondii completes its life cycle. Other source of infection occurs when drinking raw milk, ingestion of contaminated meat. Aim: This descriptive study estimated the seroprevalence and risk variables for Toxoplasma gondii infection forundergraduate students of a college of Pharmacy who were studying at University of Baghdad. The frequency rate ofToxopl
... Show MoreBuzurgan oil Field which is located in south of Iraq has been producing oil for five decades that caused production to drop in many oil wells. This paper provides a technical and economical comparison between the ESP and gas lift in one oil well (Bu-16) to help enhancing production and maximize revenue. Prosper software was used to build, match and design the artificial lift method for the selected well, also to predict the well behavior at different water cut values and its effect on artificial lift method efficiency. The validity of software model was confirmed by matching, where the error difference value between actual and calculated data was (-1.77%).
The ESP results showed the durability of ESP regarding th
... Show MoreThere were many ideas and opinions on the linkage between growth and economic reform in both developed and developing countries. The relationship is, of course, existed. Therefore, this research comes to analyses it in the Iraqi economy. This study is based on a hypothesis that the economic reformation in Iraq leads to lag level of growth with the of high rates of inflation. However, the study is designed to be included five sections. It found a positive relationship between the economic reformation and slowing of economic growth, in which the specified hypothesis is not fit to the economic reality in Iraq after 2003 &
... Show MoreTwo isolates of Staphylococcus xylosus (urease producer and non urease producer) were injected in mice at a dose of 2 × 108 colony-forming units (CFU) intraurethrally. Results showed that both isolates were able to colonize kidney and bladder of the injected mice, regardless of their urease production. Moreover, there were insignificant differences between the two groups. These results emphasized the pathogenicity of this bacteria in UTI.
JM Karhoot, AA Noaimi, WF Ahmad, The Iraqi Postgraduate Medical Journal, 2012 - Cited by 7
Increased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo
... Show MoreThe study's objective is to produce Nano Graphene Oxide (GO) before using it for batch adsorption to remove heavy metals (Cadmium Cd+2, Nickel Ni+2, and Vanadium V+5) ions from industrial wastewater. The temperature effect (20-50) °C and initial concentration effect (100-800) mg L-1 on the adsorption process were studied. A simulation aqueous solution of the ions was used to identify the adsorption isotherms, and after the experimental data was collected, the sorption process was studied kinetically and thermodynamically. The Langmuir, Freundlich, and Temkin isotherm models were used to fit the data. The results showed that Cd, Ni, and V ions on the GO adsorbing surface matched the Langmuir mo
... Show MoreThe current research aims to verify the relationship and impact of internal control activities as an independent variable in its dimensions (efficiency, training, independence) in making administrative decisions as a responsive variable and its dimensions (identifying and diagnosing the problem, searching for alternatives, evaluating alternatives, choosing the appropriate alternative, implementing the decision, following up Decision and evaluation) in the Kirkuk Water Directorate, as well as to identify the levels of their practices, and then try to come up with a number of recommendations contribute to the strengthening of internal control activities and the process of making administrative decisions of the researched Directorat
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More