Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Structural Features of Psychopathic Personality in Cinematographic Discourse: مها فيصل احمد
...Show More Authors

The dramatic personality represents the most important nerve in the cinematographic discourse due to what it represents of a permanent presence in various types of TV and cinematic stories. That is what makes the cinematographic discourse always seek to introduce the human personality in multiple methods. The psychopathic personality is a type of the personalities that got distinguished presence in the TV and cinematic productions. This is what drew the researcher's attention for the topic of the research for which she used title: structural features of the psychopathic personality in the cinematographic discourse.
The theoretical framework included the research problem which is determined by the following question: what are the stru

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Features of (Possible for Itself) in the (Alashaira) opinion – Spoken Study
...Show More Authors

My study here is about the (possible for itself) features especially in the (Alashaira) opinion, also I touch to the other logicians opinions, I clarified these features concisely in the preface to be clear in front of the reader, I made it in two studies and five subjects.I talked about the meaning of the existence in the ((possible for itself) theme, and I clarified its types in the logicians and the philosophers' opinions, through which the existence and the nonexistence are equal in it, as it cannot be existed nor be nonsexist unless with a separated reason, and there is no necessity to oblige its existence, or its nonexistence is impossible.Then I talked about the outweighing of the (possible for itself) as one side  of the exi

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 08 2022
Journal Name
Indian Ecological Society
Study the Epidermis features of Some Iraqi Veronica L. Species (Plantaginaceae)
...Show More Authors

Publication Date
Sat Sep 20 2025
Journal Name
مجلة آداب المستنصرية
Translating the Syntactic Features of Legal Texts from English into Arabic
...Show More Authors

This paper examines some syntactic features of English legal texts, and the changes that may be reflected on these features when they are translated into Arabic. For example, passivization, nominalization, complex sentences and modality. The researcher tries to demonstrate why it is difficult to suggest a specific translation of each syntactic feature, especially the modal verbs. The researcher also attempts to provide translations for some legal sentences written in some charters and international organizations. The descriptive methodology is used to identify the characteristics of these syntactic features in order to provide a proper translation of each legal sentence. It has been concluded that the translator has to be aware of the preci

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Power dissipation and time of breakdown in AC discharge of argon at a low pressure in the frequency range 5-10 kHz
...Show More Authors

The influence of 5-10 kHz audio frequency on the power dissipation in ac discharge of argon gas was studied experimentally, at pressures 50-80 mTorr and electrodes separation 10 cm (pd range 0.5-0.8 Torr.
cm). The measurements have shown that the discharge behavior in the ac circuit is equivalent to a series RC circuit. It is observed that the variation curve of discharge power P with the frequency f is approximately has a Gaussian shape. It is also observed that the curve of Pm- pd is the inverse of Paschen curve, where Pm is the maximum power in the frequency range. The time of breakdown is estimated from the curve of P- f.

View Publication Preview PDF
Publication Date
Sat Sep 28 2024
Journal Name
Journal Of The Pakistan Medical Association
Pulse transmission time and amplitude of digital pulse wave determined by fingertip plethysmography as a surrogate marker of brachial artery flowmediated dilatation
...Show More Authors

Objectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref