Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Schiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an
... Show MoreThe research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show MoreEl estudio se clasifica dentro los estudios teóricos sobre literatura que se ocupa del estudio de los métodos de la crítica literaria: El Estructralismo literario francés y el Formalismo ruso del siglo XX que se utilizan en la interpretación literaría. Las dos corrientes literarias estudian la literatura como ciencia que busca aplicar un método científico al estudio de la literatura. Dicho estudio trata de exponer las teorías críticas que surgen en el debate de la interpretación de los textos literarios como el de Susan Sontag, Ricoeur Paul y Mijail Bajitin, etc. Además se incluye algunos ejemplos implican el análisis estructuralista y formalista como Kafka y la tragedia Judía. y Sur Racine.
ABSTRACT:
... Show MoreLas diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.
En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:
"El aprendizaje de una segunda lengua (L2) es el
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreThis study aimed identify the teachers of sociology. In the development of creative thinking. I have students in middle school .llvra literary. In schools. Second Karkh From the perspective of the teachers and the students themselves numbered (41), a teacher and a school. As The study population encompassed of some students the fourth and fifth preparatory stage in the Karkh II schools, totaling 200 male and female students. As the study sample were consisted of (7) and a teacher (34) and accented (85) of male students (115) were female student The researcher the questionnaire which consisted of (39) items And to achieve the objectives of the study it was ascertained sincerity And stability. And
... Show MoreSummary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20
... Show MoreThe article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us
... Show More