Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas
... Show MoreDigital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
Abstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the
The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreLead acetate as one of the environmental pollutants can threats the life of living creatures in many ways, it has a long half-life, accumulates mainly in the soft tissue and leads to adverse effects in these tissues. An experiment was conducted to study the effect of oral feeding of lead acetate on histological features of liver, kidney, testis and muscle of albino mice. Mice were treated with 0.05 mg/100 ml lead acetate (LA) for 10 days (group A) and for and for 20 days (group B) and for 30 days (group C). The histological section of liver of mice group A characterized by slightly blurred trabecular structure with foci of hepatitis which increased with cytoplasmic vacules in group B but in group C liver reveal necrosis, heamorrhage,
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
We aimed to examine the effect of amoxicillin and azithromycin suspensions on the microhardness of sliver-reinforced glass ionomer and nano-resin modified glass ionomer (GI). Method: Thirty discs (2mm height x 4mm diameter) of each type of GI were prepared, which were randomly assigned to amoxicillin, azithromycin, and artificial saliva groups. Microhardness was evaluated by Vickers hardness test before and after three immersion cycles. Results: The overall model (P < 0.001), before/after intervention (P < 0.001), intervention group (type of antibiotic) (P=0.013), and type of glass ionomer (P < 0.001) showed significant differences among study groups (P < 0.001). Post hoc test showed only non-significant before/after difference for Azithrom
... Show MoreGraphene oxide GO was functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (ASTT) to obtain GOT. GOT characterized by FT-IR, XRD.via modification of the working electrode of the SPCE with the prepared nanomaterial ( GOT) the effect of scan rate and pH on the determination of Amoxilline (AMOX) was studied using cyclic voltammetry. AMOX show various responses at pH ranging from 2 to 7 and also was observed sharp increase in the oxidation peaks in the pH 3. The formal potential (midpoint) for AMOX was highly pH-dependent. From the effect of scan rate, surface coverage concentration of electroactive species the values of the electron transfer coefficient and the electron transfer constant rate ket
... Show MoreUnderstanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und
... Show More