Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
This research aims to investigate the role of quality management in enhancing the efficiency and effectiveness of settling accounts tax in terms of achieving satisfaction in charge of the hand and the increase of tax revenue on the other hand, by testing the main hypothesis of the study and the sub-hypotheses in the Income and Sales Tax Department in Jordan for the period 2000-20
... Show MoreIn this research, radon concentrations in some types of healthy drinking water samples available in Iraq's market were measured using a technique called Durridge RAD-7-H2O with closed loop. Then the rate of annual effective dose in human taken this water is determined.
It was found that, radon concentrations in studied samples ranged between 1.2 Bq.m-3 to 142 Bq.m-3. The results of the radon concentrations and the rate of annual effective dose for drinking water samples were significantly lower than the USEPA and WHO recommended limits that equal 500 Bq/m3 and 1 mSv/y resp
... Show MoreThe sunrise, sunset, and day length times for Baghdad (Latitude =33.34º N, Longitude =44.43º E) were calculated with high accuracy on a daily basis during 2019. The results showed that the earliest time of sunrise in Baghdad was at 4h: 53m from 5 Jun. to 20 Jun while the latest was at 7h: 07m from 5 Jan. to 11 Jan. The earliest time of sunset in Baghdad was at16 h: 55m from 30 Nov. to 10 Dec. whereas the latest was at 19h: 16m from 25 Jun. to 5 Jul. The minimum period of day length in Baghdad was 9h: 57m) in 17 Dec. whereas the maximum period was 14h: 22m) in 20 Jun. Day length was calculated and compared among regions of different latitudes(0, 15, 30, 45 and 60 north).
A new Schiff base [1-((2-(1H-indol-3-yl)ethylimino)methyl)naphthalene-2-ol] (HL) has been synthesized by condensing (2-hydroxy-1-naphthaldehyde) with (2-(1H-indol-3-yl)ethylamine). In turn, its transition metal complexes were prepared having the general formula; [Pt(IV)Cl2(L)2], [Re(V)Cl2(L)2]Cl and [Pd(L)2], 2K[M(II)Cl2(L)2] where M(II) = Co, Ni, Cu] are reported. Ligand as well as metal complexes are characterized by spectroscopic techniques such as FT-IR, UV-visible, 13C & 1H NMR, mass, elemental analysis. The results suggested that the ligand behaves like a bidentate ligand for all the synthesized complexes. On the other hand, theoretical studies of the ligand as well its metal complexes were conducted at gas phase using Hyp
... Show MoreThe research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show More