Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 13 2021
Journal Name
Egyptian Journal Of Chemistry
Development of a nanostructured double-layer coated tablet based on polyethylene glycol/gelatin as a platform for hydrophobic molecules delivery
...Show More Authors

The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Identifying Digital Forensic Frameworks Based on Processes Models
...Show More Authors

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Semantic features in the phenomena in the pottery of Dr. Ahmed Sulaiman Al-Ahmed / Trees behind fence as a sample: Semantic features in the phenomena in the pottery of Dr. Ahmed Sulaiman Al-Ahmed / Trees behind fence as a sample
...Show More Authors

Abstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
EFFECT OF LEAD ACETATE ON HISTOOGICAL FEATURES OF LIVER, SKELETAL MUSCLE AND TESTIS AND SERUM TESTOSTERON LEVEL OF LABORATORY ALBINO MICE Mus musculus.
...Show More Authors

Lead acetate as one of the environmental pollutants can threats the life of living creatures in many ways, it has a long half-life, accumulates mainly in the soft tissue and leads to adverse effects in these tissues. An experiment was conducted to study the effect of oral feeding of lead acetate on histological features of liver, kidney, testis and muscle of albino mice. Mice were treated with 0.05 mg/100 ml lead acetate (LA) for 10 days (group A) and for and for 20 days (group B) and for 30 days (group C). The histological section of liver of mice group A characterized by slightly blurred trabecular structure with foci of hepatitis which increased with cytoplasmic vacules in group B but in group C liver reveal necrosis, heamorrhage,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Numerical and Analytical Solutions of Space-Time Fractional Partial Differential Equations by Using a New Double Integral Transform Method
...Show More Authors

  This work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Dental Hypotheses
Effect of Amoxicillin and Azithromycin Suspensions on Microhardness of Sliver Reinforced and Nano Resin-Modified Glass Ionomers: An In Vitro Study
...Show More Authors

We aimed to examine the effect of amoxicillin and azithromycin suspensions on the microhardness of sliver-reinforced glass ionomer and nano-resin modified glass ionomer (GI). Method: Thirty discs (2mm height x 4mm diameter) of each type of GI were prepared, which were randomly assigned to amoxicillin, azithromycin, and artificial saliva groups. Microhardness was evaluated by Vickers hardness test before and after three immersion cycles. Results: The overall model (P < 0.001), before/after intervention (P < 0.001), intervention group (type of antibiotic) (P=0.013), and type of glass ionomer (P < 0.001) showed significant differences among study groups (P < 0.001). Post hoc test showed only non-significant before/after difference for Azithrom

... Show More
View Publication Preview PDF
Crossref (4)
Clarivate Crossref
Publication Date
Thu May 17 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Scan Rate and pH on Determination Amoxilline Using Screen Printed Carbon Electrode Modified With Functionalized Graphene Oxide
...Show More Authors

  Graphene oxide GO was functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (ASTT) to obtain GOT. GOT characterized by FT-IR, XRD.via modification of the working electrode of the SPCE with the prepared nanomaterial ( GOT) the effect of scan rate and pH on the determination of Amoxilline (AMOX) was studied using cyclic voltammetry. AMOX show various responses at pH ranging from 2 to 7 and also was observed sharp increase in the oxidation peaks in the pH 3. The formal potential (midpoint) for AMOX was highly pH-dependent. From the effect of scan rate, surface coverage concentration  of electroactive species the values of the electron transfer coefficient and the electron transfer constant rate ket

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Aug 10 2022
Journal Name
Mathematics
Modeling and Analysis of the Influence of Fear on the Harvested Modified Leslie–Gower Model Involving Nonlinear Prey Refuge
...Show More Authors

Understanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und

... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref