Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Chronic Kidny Disease and Risk of coronary Artery Disease,Aprospective study
...Show More Authors

AbstractBackground:Reduced glomeular filtration rate isassociated with increasedmorbidity in patientswith coronary arterydisease.Objectives :To analyze the declining eGFR andmortality risks in a patients with Chronic KidneyDisease and have had Coronary Artery Diseaseincluding risk factors .Patientsand Methods:The study included (160)patientsbetween the ages of 16 and 87years.Glomerular filtration rate was estimated (eGFR)using the Modification of Diet in Renal Diseaseequationand was categorized in the ranges<60 mL· min−1 per 1.73 m2and≥ 60 ml/min/1.73 m2.Baseline risk factors were analyzed by category ofeGFR,.The studied patients in emergencydepartment, were investigatedusing Coxproportional hazard models adjusting for traditiona

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation and Agglomeration of Zeolite 5A from Locally Available Raw Materials
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
FUNCTIONALITY OF TAUTOLOGY IN SOME SELECTE AMERICAN SONG LYRICS AND POEMS
...Show More Authors

Although the term' tautology' predicts negative connotation, it is often employed by poets and lyric writers to communicate more implied meanings. Through the use of tautological expressions, they exchange ideas, give more possibilities to readers to detect the meaning behind the tautological words and thus suggest details not openly communicated in the poem. Ten American song lyrics and ten American poems have been selected to be the data for the study. Data analysis is conducted on the basis of three steps:(i) identifying the type of tautology used ,(ii) detecting the syntactic realization of the tautology  and (iii) finding the functions of the use of tautology in these lyrics and poems. The study concludes that song lyrics and p

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Coloproctology
Obesity and helicobacter pylori infection in adults with non specific colitis
...Show More Authors
Abstract<p> Background Non specific colitis is defined as inflammatory condition of the colon that when examined microscopically lacks any characteristic features of any specific form of colitis and is commonly seen in reports of colonoscopy biopsies. There are many factors that cause it like obesity and H pylori.</p><p> Aim of the study To determine the association of obesity and H pylori as contributory factors to this disease.</p><p> Patients and methods This is a case-controlled study was carried out in Al-Kindy College of Medicine from January 2017 to June 2018. Sixty individuals were included; forty of them had non specific colitis. The rest were hea</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Physics
Synthesis and study the electrical properties of carbon nanotubes- polyvinylchloride composites
...Show More Authors

The aim of this paper, study the effect of carbon nanotubes on the electrical properties of polyvinylchloride. Samples of polyvinylchloride carbon nanotubes composite prepared by using hot press technique. The weight percentages of carbon nanotubes are 0,5,10 and 20wt.%. Results showed that the D.C electrical conductivity increases with increasing of the weight percentages of carbon nanotubes. Also, the D.C electrical conductivity changed with increase temperature for different concentrations of carbon nanotubes. The activation energy of D.C electrical conductivity is decreased with increasing of carbon nanotubes concentration.

View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
University Of Thiqar Journal
Problems of Translating Cultural Signs with Reference to English and Arabic
...Show More Authors

Publication Date
Fri May 01 2015
Journal Name
2015 Ieee Congress On Evolutionary Computation (cec)
Differential evolution with adaptive repository of strategies and parameter control schemes
...Show More Authors

A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Integrated Approach for Management OF Supply chain and relationship with MRP
...Show More Authors

 

Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.

Research depend on quantitative and descriptive method, It

... Show More
View Publication
Crossref
Publication Date
Mon Dec 25 2023
Journal Name
International Journal Of Drug Delivery Technology
Formulation, Characterization, Optimization, and In-vitro Evaluation of Rosuvastatin as Nanofiber
...Show More Authors

Bioavailability is the objective for an optimum formulation. The target of the analysis is to maximize both the fluidity and disintegration profile of class II weakly compounds that are water-soluble. Anti-dyslipidemia drug rosuvastatin calcium (RC) (bioavailability 20%) through formulating as nanofibers (NFs) using electrospinning (ES) technology. Twenty formulas were prepared, and different polymers and polymer combinations with various concentrations were used such as polyethylene oxide (PEO) polyvinyl pyrrolidine (PVPK-30), and hydroxypropyl methylcellulose (HPMC). Three distinct groups of maximum parameters, including polymeric solution, electrospinning method, and ambient parameter, are capable of influencing the creation alon

... Show More
View Publication
Scopus (2)
Scopus Crossref