Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreThe influence of 5-10 kHz audio frequency on the power dissipation in ac discharge of argon gas was studied experimentally, at pressures 50-80 mTorr and electrodes separation 10 cm (pd range 0.5-0.8 Torr.
cm). The measurements have shown that the discharge behavior in the ac circuit is equivalent to a series RC circuit. It is observed that the variation curve of discharge power P with the frequency f is approximately has a Gaussian shape. It is also observed that the curve of Pm- pd is the inverse of Paschen curve, where Pm is the maximum power in the frequency range. The time of breakdown is estimated from the curve of P- f.
Objectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a
... Show MoreObjective: Many studies focused on clinical cases such as ovariohysterectomy of bitches and scarcely mentioned the histological features. The present study describes the cytoarchitecture characteristics of a local dog’s mature adult reproductive tract. Materials and Methods: Sixteen samples of uterus and cervix were obtained from local breed bitches to conduct this study. The organs were processed according to routine histopathological protocol and stained with hematoxylin and eosin, Masson’s trichrome, and combined Alcian blue (2.5 pH) and PAS (AB-PAS) stains. Results: The mature endometrium formed numerous short epithelial folds and epithelial crypts composed of mucous cells and cuboidal cells. The core of the endometrium is c
... Show MoreThe present study was set to investigate the potential association between the level of Interleukin-6 (IL-6), as a key component of the pro-inflammatory response, with different thalassemia’s biological and clinical features. For this purpose, one hundred fifty blood samples were collected from 100 beta-thalassemia patients, who attended the Genetic Hematology Centre at Ibn Al- Baladi Hospital in Baghdad, Iraq, and 50 healthy subjects who were employed as a control group. IL-6 levels were estimated using an ELISA Kit, whereas other thalassemia-related clinical features (such as HbA, HbF, ferritin, blood transfusions, splenectomy status, and the history of frequent infection) were additionally assessed. The results of the present s
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More