Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Las diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.
En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:
"El aprendizaje de una segunda lengua (L2) es el
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
The article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us
... Show MoreThis study aimed identify the teachers of sociology. In the development of creative thinking. I have students in middle school .llvra literary. In schools. Second Karkh From the perspective of the teachers and the students themselves numbered (41), a teacher and a school. As The study population encompassed of some students the fourth and fifth preparatory stage in the Karkh II schools, totaling 200 male and female students. As the study sample were consisted of (7) and a teacher (34) and accented (85) of male students (115) were female student The researcher the questionnaire which consisted of (39) items And to achieve the objectives of the study it was ascertained sincerity And stability. And
... Show MoreSummary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20
... Show MoreThe important factor in the success of construction projects is its ability to objective estimate of the cost of the project and adapt to the changes of the external environment, which is affected by a lot of elements and the requirements of the competitive environment. The faces of those projects are several problems in order to achieve particular goals. To overcome these difficulties has been the development of research in the last two decades and turn the focus on the role of the cost of project management, by providing information and assist management in planning and control of the budget among the main elements of the project, namely, (time-cost-quality),The research aims at the possibility of developing and implementing mechanisms
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show More(Social values) are of great importance in the lives of nations and peoples as they are the frame of reference that governs the relations of members of society to each other and regulates their life affairs.
And the Prophet of Islam (may God’s prayers and peace be upon him) has told about a group of (social values) such as: spreading peace, feeding food, being fair in dealing with others, and clarifying what a Muslim should have towards his Muslim brother from the safety of the chest and refraining from harming him with the tongue and hand, and so on. Ethics and behaviors that are directly and closely related to (social values).
The best book that abounds with these (social valu
... Show More