Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Is the subject of the financial structure of the most important topics for which she received the interests of scientific research in the field of financial management , as it emerged several theories about choosing a financial structure appropriate for the facility and behavior change funding them , and in spite of that there is no agreement on a specific theory answer various questions in this regard , and a special issue of the financial structure optimization.
The objective of the research was to identify the most important theories of the structure of modern financial theory has been to focus on the capture of financial firms in two different stages of their life cycle , so-called growth and ma
... Show MoreAbstract
The logistic regression model is one of the nonlinear models that aims at obtaining highly efficient capabilities, It also the researcher an idea of the effect of the explanatory variable on the binary response variable. &nb
... Show MoreBackground: L. sativum, are traditionally used for the treatment of various diseases and thought to have medicinal value. Isolates from many part of the world is now multidrug resistant. Therefore, there is an urgent need to look for and test an alternative herbal drug.
Objective: The present study aimed to evaluate the antibacterial activity of L. Sativum seed extract against multi drug resistant (MDR) and sensitive Pseudomonas aeruginosa clinical isolates.
Subjects and Methods: An ethanolic and aqueous stock extracts were prepared from L. sativum seed plant then serial dilutions were prepared and the obtained concentrations (50, 25, 12.5 and 6.2 mg/ml) were tested against 30 multidrug-resistan
... Show MoreWe report here an innovative feature of green nanotechnology-focused work showing that mangiferin—a glucose functionalized xanthonoid, found in abundance in mango peels—serves dual roles of chemical reduction and in situ encapsulation, to produce gold nanoparticles with optimum in vivo stability and tumor specific characteristics. The interaction of mangiferin with a Au-198 gold precursor affords MGF-198AuNPs as the beta emissions of Au-198 provide unique advantages for tumor therapy while gamma rays are used for the quantitative estimation of gold within the tumors and various organs. The laminin receptor specificity of mangiferin affords specific accumulation of therapeutic payloads of this new therapeutic agent within prostate tumors
... Show MoreAbstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreThe current study aims to cover the health topics in the Iraqi journalism , to know the concern 's level of the Iraqi journalism when covering the health subjects and to know the size of its performance under the diversity of visual and audio medias. The researcher has discussed his research by wording it with a set of inquiries that should be answered via the research and study. He could have determined that by the following:
What is the concern's level of Iraqi journalism over the health subjects? What are the forms and press arts that are functionalized by the Iraqi journalism as to get the health message to the republics? What is t
... Show MoreBackground: This study compared in vitro the marginal adaptation of three different, low shrink, direct posterior composites Filtekâ„¢ P60 (packable composite), Filtekâ„¢ P90 (Silorane-based composite) and Sonic fillâ„¢ (nanohybrid composite) at three different composite/enamel interface regions (occlusal, proximal and gingival regions) of a standardized Class II MO cavity after thermal changes and mechanical load cycling by scanning electron microscopy. Materials and methods:Thirty six sound human maxillary first premolars of approximately comparable sizes were divided into three main groups of (12 teeth) in each according to the type of restorative material that was used: group (A) the teeth were restored with Filtekâ„¢ P6
... Show More