Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
The current research aims to know the extent of the impact of performance evaluation in its dimensions as an explanatory variable in the behavioural and attitudinal work outputs with its dimensions as a response variable in order to reach appropriate solutions through which the University of Fallujah seeks to achieve its goal in the process of diagnosing the axes of strength and to benefit from them in the process of strengthening the status and sobriety of the academic position of the professor and the researcher relied on The descriptive and analytical approach in carrying out this study, and data was collected from university professors, including leaders, heads of departments and divisions, who numbered (97) teachers. And fie
... Show MoreThis study aims to identify the role of forensic accounting in the Iraqi environment, banking stability, and to achieve this goal, we used the field survey method, as it is the most appropriate for studying the phenomenon in question and achieving its objectives.
Where we selected a sample consisting of (50) male and female employees, distributed among five private banks in Baghdad governorate, namely (Ashur International Bank, Development Investment Bank, Iraqi Middle East Investment Bank, Hammurabi Commercial Bank, Khaleej Commercial Bank), and the questionnaire tool was applied to them Designed for this purpose, which consisted of
... Show MoreThis study aimed to measure the accounting conservatism and the lemited factors which affected on it in the annual financial reports of insurance companies which listed on the Amman Stock Exchange during the period from 2005 to 2016, these factors were represented by firm age, firm debt and firm size.
Using the market value model (MV) To book value ( BV) Beaver and Ryan (2000) The level of the accounting conservatism was measured. The study found that the insurance companies which are listed on the ASE exercise the accounting conservatism when they were preparing financial reports. And when conducting a process of the test of the affected of the factors (The age of the
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreThe conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy
... Show MoreIn the present work, a density functional theory (DFT) calculation to simulate reduced graphene oxide (rGO) hybrid with zinc oxide (ZnO) nanoparticle's sensitivity to NO2 gas is performed. In comparison with the experiment, DFT calculations give acceptable results to available bond lengths, lattice parameters, X-ray photoelectron spectroscopy (XPS), energy gaps, Gibbs free energy, enthalpy, entropy, etc. to ZnO, rGO, and ZnO/rGO hybrid. ZnO and rGO show n-type and p-type semiconductor behavior, respectively. The formed p-n heterojunction between rGO and ZnO is of the staggering gap type. Results show that rGO increases the sensitivity of ZnO to NO2 gas as they form a hybrid. ZnO/rGO hybrid has a higher number of vacancies that can b
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreThe principle of citizenship has international dimensions that affect the application of the principle, such as the structure of the international system, and the control of the concepts of globalization, international organizations which played an important role in the consolidation of this principle.
The problem of the study revolves around the effects of international variables on the principle of citizenship in Kuwait during the period 1991-2018.
The study used several indicators, such as: the rule of law, achieving the principle of separation of powers, the right to form parties, the application of the law of nationality, and racial discrimination, women's rights, and freedom of expression.
Abstract- Plasma parameters in a planar dc-sputtering discharge in argon were measured by cylindrical electrostatic probe (Langmuir probe).Electron density, electron temperature, floating potential, and space potential were monitored as a function of working discharge pressure. Electrostatic probe and supporting circuit were described and used to plot the current – voltage characteristics. Plasma properties were inferred from the current-voltage characteristics of a single probe positioned at the inter-cathode space. Typical values are in the range of (10-16 -10-17) m-3 and (2.93 – 5.3) eV for the electron density and the electron temperature respectively.