Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed the different research papers in this area, determined the strengths and weaknesses of these studies, investigated the various improvements made in this fields and the drawbacks which have to be resolved.
ABSTRACTBackground: In Iraq smoking is a common habit in both the urban and rural areas. There are many respiratory diseases like chronic bronchitis, bronchial carcinoma and emphysema which are related to chronic tobacco smoking.Objectives: To study the effect of tobacco smoking on the respiratory system, to establish a correlation between chronic tobacco smoking and its effects on the parameters which were studied and to create awareness in tobacco smokers about the effects of tobacco on their healthMethod: In this study 100 male subjects, 50 chronic smokers and 50 non- smokers were assessed for their pulmonary function tests by using a computerized spirometer.Results: Almost all their respiratory parameters were significantly reduced.
... Show MoreBackground: The excessive use and abuse of antibiotics contribute to bacterial resistance, raising the risk of complications and treatment failures. This study investigates adherence to antibiotic prescriptions among Iraqi dental patients, highlighting implications for antimicrobial resistance.Objective: To assess adherence levels and identify factors influencing antibiotic therapy compliance among dental patients.Methods: A cross-sectional survey was conducted in which adult dental patients aged 18 and older, who had been prescribed antibiotics within the past year, participated. The modified Morisky Medication Adherence Scale-8 items was used to evaluate adherence, and data were analyzed with IBM SPSS Statistics software V26.Results: Amon
... Show MoreThis study addressed the work stress sources and level of the communicator in public relations in governmental institutions in the United Arab Emirates. The importance of this study is the lack of studies on work stress of the communicator in public relations. The study aimed to investigate the work stress source Physical, individual, groups, organizational and Professional source which effect on the performance of communicator in public relations. The researcher used the descriptive approach and questionnaire as an essential tool for collecting information. Some of the important results of the study are The communicator in public relations facing stress in work by 42% which affect on his performance by average level. The organizational
... Show MoreA prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More