Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
The Intelligent Auto-Tuning Controller Design Based on Dolphin Echo Location for Blood Glucose Monitoring System
...Show More Authors

This paper presents an enhancement technique for tracking and regulating the blood glucose level for diabetic patients using an intelligent auto-tuning Proportional-Integral-Derivative PID controller. The proposed controller aims to generate the best insulin control action responsible for regulating the blood glucose level precisely, accurately, and quickly. The tuning control algorithm used the Dolphin Echolocation Optimization (DEO) algorithm for obtaining the near-optimal PID controller parameters with a proposed time domain specification performance index. The MATLAB simulation results for three different patients showed that the effectiveness and the robustness of the proposed control algorithm in terms of fast gene

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Engineering
Influence of Using Various Percentages of Slag on Mechanical Properties of Fly Ash-based Geopolymer Concrete
...Show More Authors

In order to implement the concept of sustainability in the field of construction, it is necessary to find an alternative to the materials that cause pollution by manufacturing, the most important of which is cement. Because factory wastes provide siliceous and aluminous materials and contain calcium such as fly ash and slag that are used in the production of high-strength geopolymer concrete with specifications similar to ordinary concrete, it was necessary for developing this type of concrete that is helping to reduce CO2 (dioxide carbon) in the atmosphere. Therefore, the aim of this study was to study the influence of incorporating various percentages of slag as a replacement for fly ash and the effect of sl

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Biological Effect of Different Concentrations of Bacillus Thurngensis Isolated From The Soils of Sawa Lake, Al Muthanna Governorate on The of Hypera postica at Different Time Periods
...Show More Authors
Abstract<p>This study conduct in Al-Muthanna governorate to assess five concentrations of <italic>Bacillus</italic> thurngensisagonist <italic>Hyperapostica</italic>. The results showed the presence of <italic>Bacillus thurngensisin</italic> all the studied sites of Lake Sawa in Muthanna Governorate, and the rates of its presence were close to the same sites, and the rate of its presence in those sites was 35%, and its highest rate was recorded in the north and east of the lake, as it reached 40% and the lowest amounted to 30% in the two sites south and west site. The results of the study showed that five concentrations were taken from bacterial isolates of <it></it></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Selection of the initial value of the time series generating the first-order self-regression model in simulation modeAnd their impact on the accuracy of the model
...Show More Authors

In this paper, compared eight methods for generating the initial value and the impact of these methods to estimate the parameter of a autoregressive model, as was the use of three of the most popular methods to estimate the model and the most commonly used by researchers MLL method, Barg method  and the least squares method and that using the method of simulation model  first order autoregressive through the design of a number of simulation experiments and the different sizes of the samples.

                  

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
A topology on a ring part of is-algebra
...Show More Authors

Scopus (2)
Scopus Clarivate
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Proposed Study Unit Based on the Funds of Knowledge Theory in Developing the Attitudes Towards Cultural Identity and the Proposed Study Unit among Students of Basic Education in the Sultanate of Oman
...Show More Authors

The present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Sand Modified with Nanoparticles of Calcium, Aluminum, and CTAB in the Form of Layered Double Hydroxide for Removing of Amoxicillin from Groundwater
...Show More Authors

The addition of new reactive sites on the surface area of the inert sand, which are represented by layered double hydroxide nanoparticles, is the primary goal of this work, which aims to transform the sand into a reactive material. Cetyltrimethylammonium bromide (CTAB) surfactant is used in the reaction of calcium extracted from solid waste-chicken eggshells with aluminum prepared from the cheapest coagulant-alum. By separating amoxicillin from wastewater, the performance of coated sand named as "sand coated with (Ca/Al-CTAB)-LDH" was evaluated. Measurements demonstrated that pH of 12 from 8, 9, 10, 11, and 12, CTAB dosage of 0.05 g from 0, 0.03, 0.05, and 0.1 g, ratio of Ca/Al of 2 from 1, 2, 3, and 4, and mass of sand of 1 g/50 mL from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Planning the Production of the Electrical Distribution Converter (400KV/11) Using Time Series Methods and Goal Programming in the Fuzzy Environment
...Show More Authors

This Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref