Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Sludge from stone-cutting (SSC) factories and stone mines cannot be used as decorative stones, stone powder, etc. These substances are left in the environment and cause environmental problems. This study aim is to produce artificial stone composite (ASC) using sludge from stone cutting factories, cement, unsaturated resin, water, silicon carbide nanoparticles (SiC-NPs), and nano-graphene oxide (NGO) as fillers. Nano graphene oxide has a hydrophobic plate structure that water is not absorbed due to the lack of surface tension on these plates. NGO has a significant effect on the properties of artificial stone due to its high specific surface area and low density in the composite. Its uniform distribution in ASC is very low due to its hydropho
... Show MoreBackground: The mechanical and physical properties of Polymethyl methacrylate (PMMA) don’tfulfill the entire ideal requirements of denture base materials. The purpose of this study was to produce new modified polymer nanocomposite (PMMA /ZrO2-TiO2) andassess itsimpact strength, transverse strength and thermal conductivity in comparison to the conventionalheat polymerized acrylic resin. Materials and Methods: Both ZrO2 and TiO2nano fillers were silanized with TMSPM (trimethoxysilyl propyl methacrylate) silane coupling agent before beingdispersed by ultrasonication with the methylmethacrylate (monomer) and mixed with the polymer by means of 2% by weight in (1:1) ratio, 60 specimens were constructed by conventional water bath processing
... Show MoreFlexible pavements are subjected to three main distress types: fatigue crack, thermal crack, and permanent deformation. Under severe climate conditions, thermal cracking particularly contributes largely to a considerable scale of premature deterioration of pavement infrastructure worldwide. This challenge is especially relevant for Europe, as weather conditions vary significantly throughout the year. Hydrated lime (HL) has been recognized as an effective additive to improve the mechanical properties of asphalt concrete for pavement applications. Previous research has found that a replacement of conventional limestone dust filler using hydrated lime at 2.5% of the total weight of aggregates generated an optimum improvement in the mec
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MorePolymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More