Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
The chemical bath deposition technique (CBD) is considered the cheapest and easiest compared with other deposition techniques. However, it is highly sensitive to effective parameter deposition values such as pH, temperature, and so on. The pH value of the reaction solution has a direct impact on both the nucleation and growth rate of the film. Consequently, this study presents a novel investigation into the effect of a precise change. in the pH reaction solution value on the structural, morphological, and photoresponse characteristics of tin monosulphide (SnS) films. The films were grown on a flexible polyester substrate with pH values of 7.1, 7.4, and 7.7. The X-ray diffraction patterns of the grown films at pH 7.1 and 7.4 confirmed
... Show MoreIncremental sheet forming (ISF) process offers a high degree of flexibility in the manufacturing of different sheet parts, which makes it an ideal candidate for prototype parts as well as efficient at fabricating various customized products at low production costs compared to traditionally used processes. However, parts produced in this process exhibit notable geometrical inaccuracy and considerable thickness reduction. In this paper, the single point incremental sheet forming variant of the process has been implemented to manufacture a highly customized cranial implant starting from the computed tomography (CT) scan data of the patient's anatomy. A methodology, from the modeling to the realization of the implant, is presented and discus
... Show MoreThe research aims to identify the role of strategic improvisation as an independent variable with its dimensions (Building the Solution, Intuition, Adaptation, and Spontaneity) and the Entrepreneurial Orientation as a dependent variable with its dimensions (Identifying Opportunities, Creativity, Adopting risk, and Vision). This research has been applied in the Rafidain Bank and its branches (Sunk, People, Al-Firdaws, and Alawiya); it used the questionnaire as a basic tool for collecting information. The sample was intentionality, which included all the heads of departments in the bank’s branches, which amounted to (33) workers, and data on the questionnaire paragraphs of 28 were processed using the SPSS V.23 and AMOS V.23). The most impor
... Show MoreDetermining risk indicators for dental implants is an essential strategy for preventing peri-implant diseases and effective diagnosis of dental implant success. To investigate the impact of certain potential factors on the osseointegrated dental implant. Eighty-four individuals were included in our study, 50 cases as a patient’s group and 34 participants as a control group. All cases were diagnosed based on certain criteria, 30 (60%) of patients had peri-implantitis, 20 (40%) with severe periimplantitis, 36(72%) were generalized, and 15 (30%) as localized peri-implantitis cases. The study has indicated that 44.7% of dental implants were in the anterior maxilla, followed by (27.3%) posterior maxilla, (17.4%) posterior mandible, and (10.4%)
... Show MoreThis research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreInternet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreIt has become necessary to change from a traditional system to an automated system in production processes, because it has high advantages. The most important of them is improving and increasing production. But there is still a need to improve and develop the work of these systems. The objective of this work is to study time reduction by combining multiple sequences of operations into one process. To carry out this work, the pneumatic system is designed to decrease\ increase the time of the sequence that performs a pick and place process through optimizing the sequences based on the obstacle dimensions. Three axes are represented using pneumatic cylinders that move according to the sequence used. The system is implemented and
... Show More