Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
الغرض - تعتمد هذه الدراسة على المنهج الوصفي التحليلي من خلال جمع البيانات اللازمة وتحليلها، كون هذا المنهج يركز على استطلاع الآراء لعينة البحث وتوجهاتها ، وتهدف إلى تطوير نموذج يدرس العلاقة بين خلق المعرفة والبراعة التنظيمية في المصارف الخاصة العراقية والتحقق من صحته تجريبياً. التصميم / المنهجية / المدخل- تم إجراء مسح عبر استمارة استبيان لجمع البيانات من عينة من (113) مدير من مصارف تجارية خاصة بالإضافة إلى ذلك ا
... Show MoreCloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optim
... Show MoreOlmesartan medoxomil (OM) has low bioavailability and limited solubility. To enhance bioavailability, fast dissolving films (FDF) with mixed micelles of soluplus (SPL) and solutol HS15 (STL H15) were developed using solvent casting. The optimised formula, FM2, used polyvinyl alcohol (PVA) and showed high entrapment efficiency, rapid disintegration, and significant improvement in OM bioavailability compared to the market tablet (Olmetec®). FM2 also demonstrated stability and potential for enhanced drug delivery.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground: The ideal maxillofacial prosthesis should have fine and thin boundaries that bindwith the surrounding facial structures and possess high tear strength.This study aims to determinethe best percentages of nanofiller (TiO2) and intrinsic pigment (silicone functional intrinsic) thatcould be mixed in as additives to improve the tear strength of Cosmesil M511 andVST50F siliconeelastomers with the least effect on their hardness.Materials and Methods: In this in vitro experimental study, a total of 80 samples, 40 for eachelastomer, were fabricated. Each elastomer sample was split into two equal groups to test for tearstrength and Shore A hardness. Each group consisted of 20 samples, including 10 control sampleswithout additives and 10 e
... Show MoreThis research deals with the effect of gallium oxide and cerium oxide as dopants on the structural and optical characteristics of tin oxide. Gallium and cerium oxide doped tin oxide was prepared with different doping concentrations (0, 0.03, 0.05 and 0.07) wt. pure and doped tin oxide thin films were prepared by the pulsed laser deposition technique. X-ray diffraction and UV-Visible spectrophotometer were employed to investigate both oxides doping effects. Results showed that all prepared samples have poly-crystalline structure with a preferred plane of crystal growth along (110), where the crystal size grew from 40.3 nm to 64.5 nm and to 43.5 nm for Ga2O3 and CeO2 doped tin oxide thin films, res
... Show MoreThis study aims to measure and analyze the direct and indirect effects of the financial variables, namely (public spending, public revenues, internal debt, and external debt), on the non-oil productive sectors with and without bank credit as an intermediate variable, using quarterly data for the period (2004Q1–2021Q4), converted using Eviews 12. To measure the objective of the study, the path analysis method was used using IBM SPSS-AMOS. The study concluded that the direct and indirect effects of financial variables have a weak role in directing bank credit towards the productive sectors in Iraq, which amounted to (0.18), as a result of market risks or unstable expectations in the economy. In addition to the weak credit ratings of borr
... Show MoreThe present expermint was designed to determine the effect of Sodium Selenite (0.5 mg/kg) and Vitamin A (10 mg/kg) in FSH and LH level in Albino Male Mice treated with Hexavalent Chromium (1000 ppm). `This study included 48 mice divided into six groups (1st group treated with distilled water and the 2nd group treated with Sesame Oil were considered as control group, 3th group exposed to Hexavalent chromium , 4th group treated with Sodium Selenite and exposed to Hexavalent Chromium , 5th group treated with Vitamin A and exposed to Hexavalent Chromium and 6th group treated with Sodium Selenite and Vitamin A and exposed to Hexavalent Chromium ) . The treatment lasted for 35 days. The results showed a significant (P ? 0.05) decrease in FSH an
... Show MoreIn the light of what is witnessing in the advertising arena of new ways and methods in delivering advertising message to consumers by finding new outlets to communicate with them especially through social networking sites, which became the first choice of advertising companies in order to spread its goods and services. These companies now are relying gradually on celebrities to appear with their products and goods to drive the audience's attention towards them. The thesis aims to find out the attitudes of young people towards the the advertisements that show famous celebrities on social networking sites. The researcher used survey method which aims to record, analyze and interpret the phenomenon after collecting the necessa
... Show MoreIn this paper fractional Maxwell fluid equation has been solved. The solution is in the Mettag-Leffler form. For the corresponding solutions for ordinary Maxwell fluid are obtained as limiting case of general solutions. Finally, the effects of different parameters on the velocity and shear stress profile are analyzed through plotting the velocity and shear stress profile.