Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 18 2021
Journal Name
Chemical Papers
Analytical methods for the identification of micro/nano metals in e-cigarette emission samples: a review
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Unque Necklace ; ( Al – Iqd Al – Farid) ; A Reading in the Light of Speech Acts Theory
...Show More Authors

Summed up the idea of this research in an attempt to find the establishment of the knowledge convergence to show the features of verbal acts that occurred a prime location in the lesson deliberative theory book unique contract ( IbnAbdRabbaAndalusian ) to prove that Arabic was the old literary studies included many of the features of this theory in both theoretical and practical

View Publication Preview PDF
Publication Date
Sat Dec 11 2021
Journal Name
Engineering, Technology & Applied Science Research
Behavior of RC Beams Strengthened with NSM-CFRP Strips Subjected to Fire Exposure: A Numerical Study
...Show More Authors

The use of Near-Surface Mounted (NSM) Carbon-Fiber-Reinforced Polymer (CFRP) strips is an efficient technology for increasing flexural and shear strength or for repairing damaged Reinforced Concrete (RC) members. This strengthening method is a promising technology. However, the thin layer of concrete covering the NSM-CFRP strips is not adequate to resist heat effect when directly exposed to a fire or at a high temperature. There is clear evidence that the strength and stiffness of CFRPs severely deteriorate at high temperatures. Therefore, in terms of fire resistance, the NSM technique has a significant defect. Thus, it is very important to develop a set of efficient fire protection systems to overcome these disadvantages. This pape

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
مجلة ميسان للدراسات الأكاديمية
Enhancing Photostability Of Maxillofacial Silicone By The Addition Of Ultraviolet Absorbing Bisoctrizole:, A Review Of Literature
...Show More Authors

View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Iraqi Geological Journal
History Matching of Reservoir Simulation Model: a Case Study from the Mishrif Reservoir, Buzurgan Oilfield, Iraq
...Show More Authors

In petroleum reservoir engineering, history matching refers to the calibration process in which a reservoir simulation model is validated through matching simulation outputs with the measurement of observed data. A traditional history matching technique is performed manually by engineering in which the most uncertain observed parameters are changed until a satisfactory match is obtained between the generated model and historical information. This study focuses on step by step and trial and error history matching of the Mishrif reservoir to constrain the appropriate simulated model. Up to 1 January 2021, Buzurgan Oilfield, which has eighty-five producers and sixteen injectors and has been under production for 45 years when it started

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Journal Of Positive School Psychology
Designing A Quality Costing System In Commercial Banks (Applied Research In The Investment Bank Of Iraq)
...Show More Authors

Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Loss of the Epigenetically Inactivated-X-Chromosome (Barr Body) a Potential Biomarker for Breast Cancer Development
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Experimental Investigation of a Single Basin -Single Slope Solar Still Coupled with Evacuated Tube Solar Collector
...Show More Authors

This work is an experimental investigation for single basin-single slope solar still coupled with an evacuated tube solar collector. The work is carried out under the climatic conditions of Baghdad city (33.2456º North and East latitude, 44.3337º longitude) through certain days of the months of the year 2019 to study the impact of using evacuated tube solar collector on the daily productivity and efficiency under the outdoors climatic conditions. It was found that using the evacuated tube solar collector increase daily productivity from 2.175 kg/  to 2.95 kg/ for 9 hours (35.63 %) for clear days, also an enhancement about 10.97 % in daily efficiency.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Medical Journal Of Babylon
Assessment of Six Polymorphic Variants as Genetic Risks for Coronary Artery Disease: A Case–Control Study
...Show More Authors
Abstract<sec> <title>Background:

Coronary artery disease (CAD) is the leading cause of death worldwide. Certain genetic polymorphisms play an important role in this multifactorial disease, being linked with increased risk of early onset CAD.

Objective:

To assess six genetic polymorphisms and clinical risk factors in relation to early onset nondiabetic Iraqi Arab CAD patients compared to controls.

Materials and Methods:

This case–contro

... Show More
View Publication
Scopus Crossref