Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.
Unmanned aerial vehicles (UAVs) can provide valuable spatial information products for many projects across a wide range of applications. One of the major challenges in this discipline is the quality of positioning accuracy of the resulting mapping products in professional photogrammetric projects. This is especially true when using low-cost UAV systems equipped with GNSS receivers for navigation. In this study, the influence of UAV flight direction and camera orientation on positioning accuracy in an urban area on the west bank of the Euphrates river in Iraq was investigated. Positioning accuracy was tested in this study with different flight directions and camera orientation settings using a UAV autopilot app (Pix4Dcapture software
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreNew tetradentate Schiff base [H2L] namely [2,2׳ -(ethane-1,2- diylbis (azan-1-ylylidene) diacetic acid)] was prepared from condensation of ethylenediamine with glyoxylic acid in ethanol as a solvent in presence of drops of 48% HBr .The structure of ligand (H2L) was characterized by,F-IR, U.V-Vis.,1H-,13C-NMR, pectrophotometer,melting point and elemental microanalysis C.H.N. Metal complexes of the ligand (H2L) in general Molecular formula [M(L)(H2O)2], where M= Co(II), Ni(II), Cu(II), Mn(II) and Hg(II); L=(C6H8N2O4) were synthesized were characterized by, Atomic absorption, F-IR, U.V-Vis. spectra, molar conductivity and magnetic susceptibility.It was found that all the complexes showed octahedral geometries.And
... Show MoreThe present work involved synthesis of new thiozolidinone derivatives,These derivatives could be divided into three type of compounds; quinolin-2-one[V]a,b ,Schiff bases[VI]a,b and imide compounds[VII]a-d. The reaction p-Hydroxyacetophenone with thiosemicarbazide led to formation thiosemicarbazon compound [II], the reacted of thiosemicarbazone with chloro acetic acid in CH3CO2Na led to yield 4- thiazelidinone compound[III] in addition, thiosemicarbazide was POCl3 to [III] give [IV] compound used intermediates to synthesis new compounds of reacted with two type of coumarin in glacial acetic acid to give quinolin-2-one[V]a,b, The later compound refluxing with different benzaldehyde in dry benzene and glacial acetic acid give Schiff bases[VI]a
... Show MoreThree complexes of copper(II) and iron(II) with mixed ligands acetylacetonebis(thio-semicarbazone)- ABTSH2 and benzaldazine- BA have been prepared and characterized using different physico-chemical techniques including the determination of metal contents, mole-cular weight, measurement of molar conductivity, magnetic moment, molar refraction, infrared and electronic spectra. Accordingly, octahedral complexes having general formulaes [Cu2(ABTSH2)2(BA)2Cl2]Cl2 and [M2(ABTSH2)2(BA)2(SO4)2] {M= Cu(II) or (Fe(II)} have been proposed. The resulted complexes screened for antifungal activity in vitro against the citrus pathogen Aspergillus niger and Fusarium sp. which caused root rot of sugar and the beans pathogen Alternaria sp. All the complex
... Show MoreThere is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn
Estimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust M method after their development through the use of sequential approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show More