Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.
G. tuberculosa is a newly recorded species from the Caryophyllaceae family for Iraqi flora, collected from the Arbil district from May to August. Morphological descriptions with macro and micro features illustrated with plates and dimensions, the species is related to G. pallida and distinguished from calyx properties, especially the presence of large prominent druses crystals. Keywords: Caryophyllaceae, Gypsophila, Iraq, New record, pallida.
A research include of synthesized five member ring, which has been synthesized by condensation of 2-(1-(4- hydroxyphenyl) ethylidene)hydrazine-1-carbothioamide[I] with α-chloro ethylacetate in sodium acetate (fused) to form ethyl 2-(4-(1-((4-oxo-2-thioxopyrrolidin-3-ylidene)hydrazono) ethyl)phenoxy)acetate [II]. After that reacted [II]with hydrazine hydrate to resulting compound [III]. Compound [III] was refluxed with 4-aminobenzoicacid in excess of phosphorus oxy chloride give compound [IV],the later compound [IV] interact with acetyl acetone or ethylacetoacetate give to pyrazole and pyrazoline derivatives[V],[VI]. While when reacted with different aromatic aldehydes and one ketone consistence Schiff base derivatives [VII]a-e . The FTIR a
... Show MoreThis work contain many steps starting from esterification of isophthalic acid to yield diester compound [I] which was converted to their acid hydrazide [II], then the later compound reacted with ethylacetoacetate to yield pyrazol-5-one compound [III]. Afterword added acetyl chloride to give the compound [IV], thereaction of this compound with theiosemicarbazide ledto produce a new carbothioamide compound [V], Which was reacted with ethyl chloro acetate to yield thethioxoimidazolidin compound [VI]. The condensation reaction of this compound with different substituted aldehyde give new alkene derivatives[VII]a-d. The synthesized compounds were characterized by melting points , FT-IR ,1H-NMR and Mass spectroscopy .
Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.
Novel heterocyclic polyimide 5(a,b) have been synthesized based on polyacrylic backbone. The synthetic route start with nucleophilic substitution of 2-amino, or 4-amino, pyridine 1(a,b) to the polyacryloyl chloride afforded poly substituted amide 2(a,b). Another nucleophilic substitution were carried with adipoyl chloride to form polyimide chloride 3(a,b). Treatment of 3(a,b) with hydrazine hydrate afforded acid hydrazide polyimide 4(a,b), which upon cyclocondensation with carbon disulfide gave the target heterocyclic polyimide. The synthesized compounds were identified by spectroscopic methods: FT-IR, 1H-NMR and 13C-NMR.
Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, satura
... Show MoreIn the present study, new five polymers of acryloyl chloride have been synthesized by reaction 4-aminoantipyrine with many substituted acid chloride (A-E). Then condensation of polyacryloyl chloride with the product in one step (A-E), in a suitable solvent in the presence amount of (Et3N) to obtain new polyimides(A1-E5). The prepared compounds were characterized by UV. FT-IR, 1H-NMR and 13C-NMR spectroscopy and measuring of other physical properties such as softening point, melting point and solublities.
In this paper the new starting material 2-(5-chloro-1H-benzo[d]imidazole-2-yl) aniline (1) was synthesized by the condensation reaction of 4-chloro-o-phenylenediamine and anthranilic acid .The new Mannich base derivatives were synthesized using formaldehyde and different secondary amines to synthesize a new set of benzimidazole derivatives(2-5). Also, the new Schiff-base derivatives (6-10) were synthesized from the reaction of compound (1) with various aromatic aldehydes and the closure-ring was done successfully using mercapto acetic acid to get the new thiazolidine derivatives(11-12).These new compounds were characterized using some physical techniques like:FT-IR Spectra and 1HNMR Spectra.
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe new media scene reveals that the unprecedented overlap of a number of technical, economic, and political factors has made the new media a very complicated issue; and the focus of specialized and public debates about its impact on traditional means of communication and forms of social media and social relations. Then, the same scene discloses the reality of the relationship between the new and the traditional. These are the axes that will be will be discussed in this study.