Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
In globalization, the world became open area to competition for the attractive of investment, and the abilities of each country to win the confidence of investors depend upon the preparation to optimize circumstances. The competitiveness is an essential means of expanding the capacity of developed to coexist in an international environment characterized by globalization. While competition describes the market structure, the behavior of investors and business, competitiveness is interested in the evaluation of business performance or countries and compare them in the conditions of competition available in these markets. Regarding Malaysia, which is depend on FDI-Export- Led Growth strategy, it has taking on diffe
... Show More
Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an ob
... Show MoreA fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. Th
... Show MoreConcrete columns with hollow-core sections find widespread application owing to their excellent structural efficiency and efficient material utilization. However, corrosion poses a challenge in concrete buildings with steel reinforcement. This paper explores the possibility of using glass fiber-reinforced polymer (GFRP) reinforcement as a non-corrosive and economically viable substitute for steel reinforcement in short square hollow concrete columns. Twelve hollow short columns were meticulously prepared in the laboratory experiments and subjected to pure axial compressive loads until failure. All columns featured a hollow square section with exterior dimensions of (180 × 180) mm and 900 mm height. The columns were categorized into
... Show MoreSeveral stress-strain models were used to predict the strengths of steel fiber reinforced concrete, which are distinctive of the material. However, insufficient research has been done on the influence of hybrid fiber combinations (comprising two or more distinct fibers) on the characteristics of concrete. For this reason, the researchers conducted an experimental program to determine the stress-strain relationship of 30 concrete samples reinforced with two distinct fibers (a hybrid of polyvinyl alcohol and steel fibers), with compressive strengths ranging from 40 to 120 MPa. A total of 80% of the experimental results were used to develop a new empirical stress-strain model, which was accomplished through the application of the parti
... Show MoreBackground: Alveolar ridge expansion is proposed when the alveolar crest thickness is ≤5 mm. The screw expansion technique has been utilized for many years to expand narrow alveolar ridges. Recently, the osseodensification technique has been suggested as a reliable technique to expand narrow alveolar ridges with effective width gain and as little surgical operating time as possible. The current study aimed to compare osseodensification and screw expansion in terms of clinical width gain and operating time. Materials and methods: Forty implant osteotomies were performed in deficient horizontal alveolar ridges (3–5 mm). A total of 19 patients aged 21–59 years were randomized into two groups: the screw expansion group, which invo
... Show MoreThe aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show More