Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.
Background: Rheumatoid arthritis is a common chronic and destructive autoimmune arthropathy .Treatment with infliximab gives great improvement to a large numbers of patients with RA ,however, in some patients after prolonged treatment infliximab can induce anti-infliximab antibodies formation and result to loss of infliximab efficacy and active persistent disease.
Objective: to investigate the frequency of anti-infliximab antibodies in Iraqi patients with rheumatoid arthritis.
Patients and methods: fifty Iraqi RA patients(36 females and 14 males) compared with 50 control( 25 healthy control and 25 case control (patients with RA on other treatment) ) were included in this study from begging of March 201
Background: Polycystic ovary syndrome (PCOS) is a common endocrine disorder in women of reproductive age with primary manifestations of infertility, menstrual dysfunction and clinical or biochemical hyperandrogenism (hirsutism, acne and elevated androgen). Adiponectin is the most abundant adipokine. It has insulin-sensitizing, anti-atherogenic, and antiinflammatory actions.
Objective: Low adiponectin levels in women with PCOS have been largely attributed to obesity which is common among these patients. Therefore, the aim of this study was to measure adiponectin levels in normal weight women with PCOS and its contribution to development of disease.
Subjects and Methods: Fifty two (52) women were include
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show MoreOne of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of amobile slaughterhouse to reduce this phenomen
... Show MoreThe context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is now the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the robust system. In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man
... Show MoreThis study examined the imperative construction: the command, the interrogative, the prohibition, the call, and the wish. In the Diwan of Al-Shamakh bin Dirar; where the poetic verses were monitored in each of the topics of the student's creation, and the rhetorical meanings that he came out with. What is new in this study is that it is the first to study the demanded composition in the poetry of a glorious poet, Al-Shammakh bin Dirar Al-Dhubyani. As his poetry did not receive such a study, it sought to employ what was written by rhetoric scholars, in an attempt to explore the demanded composition in the poetry of Al-Shamakh. The study adopted the descriptive analytical approach, which is based on counting the number of times the poet us
... Show Moreالحمد لله رب العالمين فاتحة كل خير وتمام كل نعمة ، والصلاة والسلام على خير الأنام رسوله محمد بن عبد الله وعلى اله الأطهار وصحبه الأخيار أما بعد:
تكتسب الصياغة التشريعية أهمية متزايدة في مجال الدراسات القانونية سواء من ناحية فهم عملية إنشاء القاعدة القانونية أو من ناحية تطبيقها على يد المشتغلين في القانون من أساتذة القانون والقضاة والمحامين ، بل أن الصياغة التشريعية غدت مادة تدرس في كثير من كليات القانو
... Show MoreText documents are unstructured and high dimensional. Effective feature selection is required to select the most important and significant feature from the sparse feature space. Thus, this paper proposed an embedded feature selection technique based on Term Frequency-Inverse Document Frequency (TF-IDF) and Support Vector Machine-Recursive Feature Elimination (SVM-RFE) for unstructured and high dimensional text classificationhis technique has the ability to measure the feature’s importance in a high-dimensional text document. In addition, it aims to increase the efficiency of the feature selection. Hence, obtaining a promising text classification accuracy. TF-IDF act as a filter approach which measures features importance of the te
... Show MoreTranslation is both a social and cultural phenomenon, it can neither exist outside a social community and it is within society, nor it can be viewed as a medium of cross-cultural fertilization. This paper aims to investigate the difficulties that a translator may face when dealing with legal texts such as marriage and divorce contracts. These difficulties can be classified according to the present paper into syntactic, semantic, and cultural. The syntactic difficulties include word order, syntactic arrangement, unusual sentence structure, the use of model verbs in English, and difference in legal system. As to the semantic difficulties, they involve lack of established terminology, finding functional and lexical equivalence, word for word t
... Show MoreA developed model has been put for the hypothesis of capturing moons in explaining the origin of Jupiter moons, and study the change of the orbital properties of these satellites as well as the distance from the planet. Jupiter moons were divided into two types according to their physical and orbital properties, they are the moons , which are formed from the same material as the planet, so it was named the original moons ,while the moons that have been captured from the surrounding space was renamed exotic moons . And the moons of exotic origin asteroid belt and the Kuiper belt in the region which is behind Neptune, the origin of each clique of moons is an asteroid fragmented after colliding previously with another body and
... Show More