Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Methods: 112 placentae samples were investigated during the period from August 2007 to August 2008 under light microscopefor mother aged 15 - 45 years old.Results: It was found that normal placental shapes had no correlation to mother age, while abnormal shapes were found more inyoung age groups. The better placental measured parameters were found in mother age 20-24 years. The percentages ofabnormal umbilical cord insertion were very high compared to other studies. Babies’ gender had a correlation with theplacental thickness; male babies have thicker placentae than females. Male babies have longer umbilical cords with widerdiameter than females. Light microscope picture showed the chorionic villi with isolated fetal blood vessel were hig
... Show MoreCorruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
The surplus glycerol produced from biodiesel production process as a by-product with high quantity can be considered as a good source to prepare glycerol carbonate (GC) whereas with each 1000 kg from biodiesel obtains 100 kg from glycerol. Glycerol converted to glycerol carbonate over bio-char as a catalyst prepared by slow pyrolysis process under various temperatures from 400 ᴼC to 800 ᴼC. The char prepared at 700 ᴼC considered as a best one between the others which was manufactured to activate the transesterification reaction. GC have large scale of uses such as liquid membrane in gas separation, surfactants ,detergents , blowing agent , in plastics industry, in Pharmaceutical industry and electrolytes in lithium batteries.
... Show MoreThe current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:
There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group
... Show MoreSamples prepared by using carbon black as a filler material and phenolic resin as a binder. The samples were pressed in a (3) cm diameter cylindrical die to (250)MPa and treated thermally within temperature range of (600-1000)oC for two and three hours. Physical properties tests were performed, like density, porosity, and X-ray tests. Moreover vicker microhardness and electric resistivity tests were done. From the results, it can be concluded that density was increased while porosity was decreased gradually with increasing temperature and treating time. In microhardness test, it found that more temperature and treating time cause more hardness. Finally the resistivity was decreased in steps with temperature and treating time. It can be c
... Show MoreThin films of pure polycarbonate (PC) with anthracene doping PC films for different doping ratios (10, 20, 30, 40, 50 and 60 ml) were prepared by using a casting method. The influence of anthracene doping ratio on photo-fries rearrangement of polycarbonate was systematic investigated. Furthermore, pure PC and anthracene doping PC films were irradiated via UV light at a wavelength (254 nm) for different periods (5, 240, 288, and 360 hrs). The photo-fries rearrangement occurring in pure PC and anthracene doping PC films were monitored using UV and FTIR spectroscopies. The photo-fries rearrangement leads to scission the carbonate linkage and formation phenylsalicylate and dihydroxybenzophenes. The result of the UV spectrum confirms disappea
... Show MoreThis study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun). If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world, the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More