Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe importance of the research in the preparation of special exercises to develop some types of basketball scoring as a contribution to help the physical education teacher to find successful educational alternatives. The purpose of the study was to prepare special exercises for the cognitive (cognitive) survey in the development of motor satisfaction and learning some types of Scoring for basketball for students. Learn about the effect of cognitive exercises in cognitive development in students. The survey included students from the first stage of the Faculty of Physical Education and Sports Science \ University of Diyala (159) divided into 6 people. The sample was randomized by (b) and (b) D) and after dispersion by the standard method In
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreLayer by layer development two features of pulsed laser deposition PLD, with a high kinetic energy and sharp instantaneous deposition rating. Layered films of polymer/metal/ceramic nanocomposites consisting of polystyrene PS(as substrate) , tin Sn and cadmium oxide CdO were deposited by PLD. Structure for layered samples were measured by XRD X ray diffraction, there were appearance of peaks which reflected to formation of new compounds result of reaction between layers. Particles size was calculated using two methods and it give nanoscale. Microstrain was also calculated and exhibited high value (0.01) for sample p/m.
The aim of the research is to reveal the reality of teacher performance evaluation in the Sultanate of Oman in light of some global models. The study followed a qualitative descriptive research design. Seven forms of teacher formative and summative assessments were analyzed. Besides, an analytical template was developed, consisting of six areas related to the teaching performance of teachers. These included: lesson planning and preparation, learning environment, education, professional development, student academic, and community and parental partnership. The study reached a number of results; the most notable is the lack of change of forms for more than a decade despite the rapid development of the educational system in the sultanate in
... Show MoreThis study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show MoreAbstract:-
The phenomenon of financial and administrative corruption is not the result today, but not tied to time or designated place, he is the scourge is rampant in all countries of the world, without exception, those developed and developing, a phenomenon that crossed national boundaries and become withstand a global character, and corruption is limited to communities of particular economic systems without the other, but suffered Throughout history most societies to varying degrees, Iraq is one of the countries that suffered and continues to suffer from corruption, which has become, B grumble in most of the Iraqi state institutions, especially after the occupation in 2003 as administrative corruption in Iraq arrived i
... Show More