Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Many studies have been made and still concerning the field of translation. Since the mid-90's a considerable amount of researches has tackled the problem of gender and its effect on the process and the product of translation. Simon (1996, p 508) points out that when comparing women and men as translators and writers through history, women seem to be the weaker side. This paves the way to feminist movements which produce prominent studies concerning gender as a concept and translator's gender as practice on the quality and the accuracy of the translation.
Flotow (in Meschia, 2012, p 1-4) outlines several issues that can be
... Show MoreScams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm
... Show MoreRecent population studies have shown that placenta accreta spectrum (PAS) disorders remain undiagnosed before delivery in half to two-thirds of cases. In a series from specialist diagnostic units in the USA, around one-third of cases of PAS disorders were not diagnosed during pregnancy. Maternal
Praise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of God’s creation, Muhammad bin Abdullah, the illiterate Arab prophet, the faithful, and his family and companions.
And yet ...
The realistic view is that Islamic jurisprudence is not exaggerated in the judgment of compensation, so it is judged for everything that has been lost by the victim of a profit or his loss, but he takes into account the bearing of the guarantee between profit and loss or the principle on which the theory of bearing liability is found, and it is clear through research that Islam The principle of respecting money, souls and rights is considered a public order, but it may exclude some ca
... Show MoreThe aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
In the current research, we investigated the absorption spectrum for R590 and C480 dyes in ethanol solvent for different dye solution concentrations of 10-4, 10-5 and 10-6M. These dyes have been prepared and studied before and after gamma irradiation (first, second ionization) using cesium-137 source with absorbed doses of 18.36 Gy (time exposure of 10 days) and 73.44 Gy (with time exposure of 40 days). We noticed that the absorption intensity was decreased with decreasing concentration, before gamma irradiation while the absorption spectrum peak shifted towards the short wavelength (blue shift). It was also found that the intensity of absorption spectrum increased and shifted the absorption spectrum peak towards the long wavelength (red
... Show MoreThis paper details the process of designing, analysing, manufacturing, and testing an integrated solid-state hydrogen storage system. Analysis is performed to optimise flow distribution and pressure drop through the channels, and experimental investigations compare the effects of profile shape on the overall power output from the fuel cell. The storing of hydrogen is given much attention in the selection of a storage medium, and the effect of a cooling system to reduce the recharging time of the hydrogen storage vessel. The PTFE seal performed excellently, holding pressure over 60 bar, despite requiring changing each time the cell is opened. The assembly of the vessel was simple and straightforward, and there was no indication of pressure
... Show More