Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
This study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Praise be to God, Lord of the worlds, and the best of prayers, and extradition was made to our master Muhammad and his whole family and companions:
And after:
Surat Al-Qariah is from the royal fence, which is in the thirtieth part of the Noble Qur’an. The commentators differed on the number of verses, and the reason for its naming. This surah talked about the conditions of people on the Day of Resurrection, and about how people were removed from their graves, all of which I spoke about in the preamble.
The research is divided into six topics: the first topic dealt with strange terms, while the second topic dealt with the most important audio issues mentioned in the surah, namely (slurring, advertising, substitution, and silenc
Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show MoreA new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome
... Show MoreBackground: Arterial stiffness is related with atherosclerosis and cardiovascular disease events. Patients with atherosclerotic disease show to have larger diameters, reduced arterial compliance and lower flow velocities. Aim of study : To compare between patients of two age groups with concomitant diseases diabetes and hypertension in regard to intima media thickness and blood flow characteristics in order to estimate the blood perfusion to the brain via the common and internal carotid arteries. Subject and Methods : 40 patients with (diabetic and hypertension) diseases were enrolled , they were classified according to age. Color Doppler and B mode ultrasound was used to determine lumen Diameter (D), Intima – media thickness (IMT)
... Show MoreSchiff base derived from PVA and Erythroascorbic acid derivative (pentulosono-ɣ-lactone-2, 3-enedianisoate) was synthesized and characterized by Thin Layer Chromatography (TLC) and FTIR spectra, aldehyde was also characterized by (U.V-Vis), 1HNMR, 13CNMR and mass spectra. The inhibitory effect of prepared polymer on the activity of human serum Cholinesrerase has been studied in vitro. The polymer showed a remarkable activity at low concentration (4.5*10-3 – 4.5*10-8 M).
