Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea
... Show MoreThis study assessed the advantage of using earthworms in combination with punch waste and nutrients in remediating drill cuttings contaminated with hydrocarbons. Analyses were performed on day 0, 7, 14, 21, and 28 of the experiment. Two hydrocarbon concentrations were used (20000 mg/kg and 40000 mg/kg) for three groups of earthworms number which were five, ten and twenty earthworms. After 28 days, the total petroleum hydrocarbon (TPH) concentration (20000 mg/kg) was reduced to 13200 mg/kg, 9800 mg/kg, and 6300 mg/kg in treatments with five, ten and twenty earthworms respectively. Also, TPH concentration (40000 mg/kg) was reduced to 22000 mg/kg, 10100 mg/kg, and 4200 mg/kg in treatments with the above number of earthworms respectively. The p
... Show MoreMost below-knee prostheses are manufactured in Iraq without considering the fast progress in smart prostheses, which can offer movements in the desired directions according to the type of control system designed for this purpose. The proposed design appears to have the advantages of simplicity, affordability, better load distribution, suitability for subjects with transtibial amputation, and viability in countries with people having low socio-economic status. The designed prosthetics consisted of foot, ball, and socket joints, two stepper motors, a linkage system, and an EMG shield. All these materials were available in the local markets in Iraq. The experimental results showed t
... Show MoreBiomarkers to detect Alzheimer’s disease (AD) would enable patients to gain access to appropriate services and may facilitate the development of new therapies. Given the large numbers of people affected by AD, there is a need for a low-cost, easy to use method to detect AD patients. Potentially, the electroencephalogram (EEG) can play a valuable role in this, but at present no single EEG biomarker is robust enough for use in practice. This study aims to provide a methodological framework for the development of robust EEG biomarkers to detect AD with a clinically acceptable performance by exploiting the combined strengths of key biomarkers. A large number of existing and novel EEG biomarkers associated with slowing of EEG, reductio
... Show MoreAn image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreIn today’s competitive environment, organizational efficiency and sustained growth are crucial for survival. The performance of an organization is intricately connected to strategic planning, prompting firms to gather and leverage competitive information for a competitive advantage. Senior managers, recognizing this, initiate actions accordingly. This study aims to investigate the relationship between foresight, vision, strategic partnerships, motivation, system thinking, and organizational performance. Data, gathered through a self-administered questionnaire from various textile units, were analysed using structural equation modelling (SEM). The findings indicate that sub-constructs of strategic intelligence positively impact organizatio
... Show MoreFiber Bragg Grating has many advantages where it can be used as a temperature sensor, pressure sensor or even as a refractive index sensor. Designing each of this fiber Bragg grating sensors should include some requirements. Fiber Bragg grating refractive index sensor is a very important application. In order to increase the sensing ability of fiber Bragg gratings, many methods were followed. In our proposed work, the fiber Bragg grating was written in a D-shaped optical fiber by using a phase mask method with KrFexcimer. The resultant fiber Bragg grating has a high reflectivity 99.99% with a Bragg wavelength of 1551.2 nm as a best result obtained from a phase mask with a grating period of 1057 nm. In this work it was found that the rota
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreSocial protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show More