Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Time in the Cinema...The Two Films (The Knife and The Deceived) -A Model: كريمة ناوي
...Show More Authors

This study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun).  If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world,   the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 27 2020
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of Novel Subs. -1,3,4-Thiadiazolependant on Modified Poly(5-Vinyl Tetrazole-Co-MA)
...Show More Authors

New polymers were prepared from a monomer (5-vinyl-1H-tetrazole), which was prepared from acrylonitrile with sodium azide in the presence of ZnCl2.Another monomer (Methyl acrylate) was also used. Co-monomers were polymerized usingBPO as initiator. The second step was the preparation of copoly acid hydrazide from the reaction of compound2 with hydrazine hydrate, followed by the reaction with carbon disulphide in the presence of KOH to obtain copoly (5-subs.-2-mercapto-1,3,4-thiadiazole). Next,compound4 was reacted with chloroacetyl chloride to yield compound4 5 which was reacted with (hydrazine hydrate , phenyl hydrazine and 2,4-di nitro phenyl hydrazine) as shown in scheme(1). Physical properties of all the prepared copolymers were chara

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Partial Differential Equations In Applied Mathematics
Determination of time-dependent coefficient in time fractional heat equation
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
A training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students
...Show More Authors

       The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:

   There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Synthesis and characterization of some modified polyvinyl alcohol
...Show More Authors

Some esters were prepared from reaction of different molecular weight of PVA with some acid chloride (prepared by reaction of acid with thionyl chloride or phosphorous pentachloride)in the presence of pyridine. The thermal and reological properties were studied. The increasing Of bulky groups decreasing stability of the thermal and reological properties.

View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 26 2021
Journal Name
Iraqi Journal Of Science
Limnological Features of the Southern Part of Gharaf River and the Impacts of Floodplain Period on its Characteristics
...Show More Authors

The current study was conducted on the southern part of Gharaf  River in   order to define the physical-chemical properties and the impact of the Tigris River’s floodplain water on its ecological characteristics during 2019. Four sites were selected along the southern part of the river. The findings showed a strong connection between the temperature of air and water at all sites. A value ranging from 4.85 - 84.65 NTU was reported for turbidity. The water was found to be oligohaline, low alkaline, and well ventilated due to high dissolved oxygen concentrations. Gharaf  River is considered to be of questionable clean water, according to the results of BOD5. The total a

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
...Show More Authors

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Mon Dec 23 2024
Journal Name
Journal Of Physical Education
A Study of Actual Training Time Administration in Bedra Specialized Weightlifting Club
...Show More Authors

View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Wireless Communications And Mobile Computing
Developing a real time navigation for the mobile robots at unknown environments
...Show More Authors

<p><span>This research deals with the feasibility of a mobile robot to navigate and discover its location at unknown environments, and then constructing maps of these navigated environments for future usage. In this work, we proposed a modified Extended Kalman Filter- Simultaneous Localization and Mapping (EKF-SLAM) technique which was implemented for different unknown environments containing a different number of landmarks. Then, the detectable landmarks will play an important role in controlling the overall navigation process and EKF-SLAM technique’s performance. MATLAB simulation results of the EKF-SLAM technique come with better performance as compared with an odometry approach performance in terms of measuring the

... Show More
Scopus (12)
Crossref (3)
Scopus Crossref