In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis of ciphertext shows that the resulted cipher is robust. Each character in the plaintext has different representations in the ciphertext even if the characters are repeated through the message. The strength of generated cipher was measured through brute force attackers, they were unable to deduce the key from the knowledge about pairs of plaintext- ciphertext due to the fact that each occurrence of characters in the message will have different shift value, and as a result a diverse representation will be obtained for same characters of the message.
Geomorphology is concerned with the topographic units that make up the Earth's surface. These take many forms, such as mountains and rivers, and include many dangers such as landslides, landslides and erosion. Many studies appeared in this field to analyze its effects and risks resulting from it, including urban studies, to determine the trends of optimal urban expansion and its geomorphological interactions. The results showed that the city of Kut originated and expanded near the course of the Tigris River and its branches, and it suffers from unbalanced urban expansion, due to the high rate of population growth, and overcrowding in housing units with the growth of urban land uses in it, which prompted the city to extend horizontally and v
... Show MoreReceipt date:10/27/2021 accepted date:12/15/2021 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreAbstract That the child is aged 7 years, surrounded by information, knowledge and skillsvaried, which constitute the raw material of experience teaching and is in the rule of inputlearning, if received by the student of these data are positive, these data require research and audit, the style becomes more positive, effective, and then becomes the explorer, butnot done exploration efficiency without the visual, auditory and sensory owned by thechildren. So study aimed to identify the values of the optical track and explore mathematical and find the relationship between them. And use the descriptive approach in a manner the linkon the children of the first year of primary school age (6-7) years in my school Waziriya and Karkh, during the peri
... Show More|
Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world. The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr |
the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show MoreThe assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More