Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe study aims at evaluating the penalty of semi- intentional killing felony in the Egyptian and Algerian criminal law following the Islamic Law (Shari'a). The study used the descriptive, evalutive and analytical methodology to reach the topic in question. To meet the theoretical significance of the study, much data has been collected to give a comprehensive picture about the topic under examination. As for the practical significance of the study, it helps the juridical power to reconsider and phrase the legal materials of the semi-intentional killing penalty based on the Islamic law. The study has come to the conclusions that the Islamic Law (Shari'a) imposes a compensation (blood-money) to be g
... Show MoreSildenafil, tadalafil, and vardenafil are phosphodiesterase type 5 enzyme (PDE-5) inhibitors used for the treatment of male erectile dysfunction. This present study aims to investigate 55 herbal products indicated for men’s sexual health from the Malaysian market for adulteration of PDE-5 inhibitors and analogues. The screening and identification of 20 PDE-5 inhibitors and analogues in herbal products of various forms (powder, capsules, tablets, and pastels) were conducted using gas chromatography–electron impact-mass spectrometer (GC-EI-MS). The analysis has shown that 19 herbal products were adulterated with PDE-5 inhibitors and analogues. Unique ion fragmentations and the presence of molecular
... Show MoreAlkaloids are regarded as important nitrogen-containing chemical compounds that serve as a rich source for discovering and developing new drugs where most plant-origin alkaloids have antiproliferation effects on different kinds of cancers. Alkaloids’ continence of Calotropis procera leaves are detected by two biochemical alkaloid reagents. Also GC-MS analysis for leaf alkaloid extract was done that showed the existence of one type of alkaloid compound at retention time12.8min detected as colchicine (C22H25N06( by comparing it with colchicine standard reference (Sigma Aldrich) with M.wt 399g/mol and percentage area 7.1%. Furthermore, identification, separation, and purification
... Show MoreSuspicion in the truth that the satisfaction of the student in the criticism of the speech of the poet and the writer to I bin Al-Atheer
The phenomenon of informal building Spread recently in Iraqi residential areas, in general, and in Baghdad, in particular, due to the urgent housing need, on the one hand, and lack of commitment to building controls, on the other hand, to highlight the phenomenon of uncommitted building to controls and housing governing legislation in Iraq, leading to heterogeneity in both building densities and plot areas, and disorder in the urban fabric and urban escape of those areas. Research problem identified as the absence of a clear vision about the General aspects of the phenomenon of informal building in residential street scene, and the role of designed housing projects as a substitute for informal building in built residential areas. The des
... Show MoreRecords of two regionalized variables were processed for each of porosity and permeability of reservoir rocks in Zubair Formation (Zb-109) south Iraq as an indication of the most important reservoir property which is the homogeneity,considering their important results in criterion most needed for primary and enhanced oil reservoirs.The results of dispersion treatment,the statistical incorporeal indications,boxes plots,rhombus style and tangents angles of intersected circles indicated by confidence interval of porosity and permeability data, have shown that the reservoir rocks of Zubair units (LS),(1L) and (DJ) have reservoir properties of high quality,in contrast to that of Zubair units (MS) and (AB)which have reservoir properties of less q
... Show MoreAbstract
This research is aimed at indicating the impact of business process reengineering on corporate performance in the Office of the Inspector General of the Ministry of Higher Education and Scientific Research of the Iraqi study has identified a problem in a number of the most important questions - what the impact of the Business Process Reengineering at the corporate office performance indicators respondent? What are the actual results of the analysis of paths Administrative Process Engineering and Corporate Performance respondent in the office? In order to achieve the goal of the research and answer the questions of the problem, the study applied to a sample of
... Show MoreAbstract
The research’s goal lies in demonstrating the impact of the Federal Financial Supervision Endowment through the process of auditing the performance of the entities subject to its audit as to improve the performance of these entities, especially if the performance audit method is one of the newly applied methods that are compatible with the standards issued by the International Organization of Financial Supervision and Accounting Institutions which is the method of auditing performance according to the performance evaluation guide for programs and policies issued by the Federal Office of Financial Supervision.
T
... Show More