Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show Moren-Hexane conversion enhancement was studied by adding TCE (Trichloro-ethylene) on feed stream using 0.3%Pt/HY zeolite catalyst. All experiments were achieved at atmospheric pressure and on a continuous laboratory unit with a fixed bed reactor at a temperature range 240-270◦C, LHSV 1-3h-1, H2/nC6 mole ratio 1-4.
By adding 435 ppm of TCE, 49.5 mole% conversion was achieved at LHSV 1h-1, temperature of 270ºC and H2/nC6 mole ratio of 4, while the conversion was 18.3 mol% on the same catalyst without adding TCE at the same conditions. The activation energy decreased from 98.18 for pure Pt/HY zeolite to 82.83 kJ/mole by adding TCE. Beside enhancement the activity, selectivity and product distribution enhanced by providing DMB (Dimethyl b
2-benzamide benzothiazole complexes of Pd(II) , Pt(IV) and Au(III) ions were prepared by microwave assisted radiation. The ligand and the complexes were isolated and characterized in solid state by using FT-IR, UV-Vis spectroscopy, flame atomic absorption, elemental analysis CHNS , magnetic susceptibility measurements , melting points and conductivity measurements. The nature of complexes in liquid state was studied by following the molar ratio method which gave results approximately identical to those obtained from isolated solid state; also, stability constant of the prepared complexes were studied and found that they were stable in molar ratio 1:1.The complexes have a sequar planner geometry except Pt(IV) complex has octahedral .
... Show MoreA new Schiff base (4-chlorophenyl)(phenyl methanimine (6R,7R)-3-methyl-8-oxo-7-(2-phenylpropanamido)-5-thia-1-azabicyclo[4.2.0]oct-2-ene-2-carboxylate=HL=C29H24ClN3O4S) has been synthesized from β-lactam antibiotic (cephalexin mono hydrate (CephH)=(C16H19N3O5S.H2O) and 4- chlorobenzophenone. Metal mixed ligand complexes of the Schiff base were prepared from chloride salt of Fe(II), Co(II), Ni(II), Cu(II), Zn(II) and Cd(II), in 50% (v/v) ethanol – water medium in aqueous ethanol(1:1) and Saccharin(C7H5NO3S) containing sodium hydroxide. Several physical tools in particular; IR, C:H:N , 1H NMR,13C NMR for ligand, melting point, molar conductance, magnetic moment. and determination of the percentage of the metal in the complexes by flame(AAS
... Show More