Preferred Language
Articles
/
nBboCocBVTCNdQwCYDKb
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.

Publication Date
Wed Jan 01 2014
Journal Name
The Scientific World Journal
An In Vitro Assessment of Gutta-Percha Coating of New Carrier-Based Root Canal Fillings
...Show More Authors

The first aim of this paper was to evaluate the push-out bond strength of the gutta-percha coating of Thermafil and GuttaCore and compare it with that of gutta-percha used to coat an experimental hydroxyapatite/polyethylene (HA/PE) obturator. The second aim was to assess the thickness of gutta-percha around the carriers of GuttaCore and HA/PE obturators using microcomputed tomography (μCT). Ten (size 30) 1 mm thick samples of each group (Thermafil, GuttaCore, and HA/PE) were prepared. An orthodontic wire with a diameter of 0.5 mm was attached to the plunger of an Instron machine in order to allow the push-out testing of the gutta-percha coating. Five samples of (GuttaCore and HA/PE) were scanned using

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Samarra Journal Of Pure And Applied Science
New Ligand-Based Metal Complexes: Synthesis, Spectroscopic Characterization, Thermal Behavior, Anticancer Properties, and Biological Activity
...Show More Authors

New ligands, N1, N4-bis (benzo[d]thiazol-2- ylcarbamothioyl) succinamide (L1) and N1, N4- bis (benzylcarbamothioyl)succinamide (L2), derived from succinyl chloride and 2-amino benzothiazole or benzylamine, respectively, have been used to prepare a set of transition metal complexes with the general formula [M2(L)Cl4], where L=L1 or L2, M = Mn(II), Ni(II), Cu(II), Cd(II), Co(II), Zn(II) or Hg(II). The synthesized compounds were characterized using various analytical techniques including TGA, 13C NMR, mass spectroscopy, 1H and Fourier-transform infrared (FTIR) spectroscopy, magnetic measurement, molar conductivity, electronic spectrum, (%M, %C, %H, %N) and atomic absorption flame (AAF) analysis. The results showed that (L1, L2) bin

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
NEW PERSPECTIVES ON SHAKESPEAR'S "THE TEMPEST"
...Show More Authors

         This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material,  and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, rec

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Some New Results on Lucky Labeling
...Show More Authors

Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if  for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
NEW PERSPECTIVES ON SHAKESPEAR'S "THE TEMPEST"
...Show More Authors

This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is th

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
New Normality on Generalized Topological Spaces
...Show More Authors
Abstract<p>A space X is named a πp – normal if for each closed set F and each π – closed set F’ in X with F ∩ F’ = ∅, there are p – open sets U and V of X with U ∩ V = ∅ whereas F ⊆ U and F’ ⊆ V. Our work studies and discusses a new kind of normality in generalized topological spaces. We define ϑπp – normal, ϑ–mildly normal, & ϑ–almost normal, ϑp– normal, & ϑ–mildly p–normal, & ϑ–almost p-normal and ϑπ-normal space, and we discuss some of their properties.</p>
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of using Project - Based Learning method in development intensive reading skills at middle school students
...Show More Authors

The purpose of this research is to identify the effect of the use of project-based learning in the development of intensive reading skills at middle school students. The experimental design was chosen from one group to suit the nature of the research and its objectives. The research group consisted of 35 students. For the purpose of the research, the following materials and tools were prepared: (List of intensive reading skills, intensive reading skills test, teacher's guide, student book). The results of the study showed that there were statistically significant differences at (0.05) in favor of the post-test performance of intensive reading skills. The statistical analysis also showed that the project-based learning approach has a high

... Show More
View Publication Preview PDF