Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study is the first investigation in Iraq dealing with genotyping of
The root lesion nematode, Pratylenchus neglectus, is one of the most damaging nematodes to affect wheat worldwide. The nematode is widely distributed in Montana, primarily affecting winter wheat within the state. Managing the nematode primarily involves rotation to resistant and moderately resistant crops (peas, lentils, and barley). A nematode survey was conducted across the state nearly 10 years after an initial survey, to reassess the nematode threat and assess the impact of changing trends in crop rotations. To assess the broad applicability of rotation crops to control P. neglectus across Montana, greenhouse trials were conducted to challenge rotational crops using eight populations of P. neglectus collected from geographicall
... Show MoreThe preparation of the title compound, C26H25N, was achieved by the condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 molar ratio. There are two crystallographically independent molecules in the asymmetric unit. The two cyclohexyl rings adopt an