Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
The effect of using synthetic fibers on some properties of modified juss
...Show More Authors

This paper examines the mechanical properties of a composite material made of modified Iraqi gypsum (juss) reinforced with polypropylene fibers. The modified juss was prepared by adding two percentages of cement (5, 10) %. Two percentages of polypropylene fibers were used, to reinforce the modified juss (1, 2) %. The water/dry compound ratio used was equal to 0.53%. The composite was evaluated based on compressive strength, flexural strengths, absorption percentage, density, acoustic impedance, ultra - pulse velocity, longitudinal shrinkage and setting time tests. The results indicated that the inclusion of cement on to juss increases the compressive strength, absorption percentage, density, acoustic impedance, ultra - pulse velocit

... Show More
View Publication
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Scenography Features in the Iraqi Contemporary Theatre Show (Macbeth Play, by Salah Al-Qasab- A Model)
...Show More Authors

Societies developed throughout history with the development of life technology, that ideas presented by the contemporary art have been crystallized. The development included all the artistic fields such as the dramatic arts which depend on many effects and elements that led to the completion of the structure of the theater show. Scenography is considered one of the most important elements that the theatre show depends on such as the decoration, lighting, sound effects, costumes and accessories. The research addressed the following question: what are the characteristics and traits of scenography in the theatre show?
The research importance has become clear because it sheds lights on the characteristics of scenography in the Iraqi thea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 05 2024
Journal Name
International Journal Of Science And Research (ijsr)
Effect of Body Mass Index on Eruption Time of Permanent First Molars and Incisors among a Group of 6- 8 Year Old Iraqi School Children
...Show More Authors

View Publication
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
International Medical Journal
Effect of Accelerated Canine Retraction by Vitamin D3 Local Administration on Apical Root Resorption, Alveolar Bone Integrity, and Chair-side Time: A Prospective Clinical Study.
...Show More Authors

Objectives: To evaluate the effect of vitamin D3 local injections on apical root resorption, alveolar bone integrity, and chair-side time following three and six months of canine retraction. Subjects and Methods: Seventeen adult patients (18-35 years old) of class I and II malocclusions were recruited, who required bilateral maxillary 1st premolars extraction before starting maxillary canines retraction. The experimental side received 25 pg dose of vitamin D3 injected locally into the distal periodontal sulcus of the canine (before force application) every three weeks, while the control side received retraction force only. Periapical radiographic evaluation was conducted after 3 and 6 months of the start of canines' retraction. Results: At

... Show More
Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Synthesis and characterization of some modified polyvinyl alcohol
...Show More Authors

Some esters were prepared from reaction of different molecular weight of PVA with some acid chloride (prepared by reaction of acid with thionyl chloride or phosphorous pentachloride)in the presence of pyridine. The thermal and reological properties were studied. The increasing Of bulky groups decreasing stability of the thermal and reological properties.

View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Heliyon
Removal of amoxicillin from contaminated water using modified bentonite as a reactive material
...Show More Authors

This study concerns the removal of a trihydrate antibiotic (Amoxicillin) from synthetically contaminated water by adsorption on modified bentonite. The bentonite was modified using hexadecyl trimethyl ammonium bromide (HTAB), which turned it from a hydrophilic to a hydrophobic material. The effects of different parameters were studied in batch experiments. These parameters were contact time, solution pH, agitation speed, initial concentration (C0) of the contaminant, and adsorbent dosage. Maximum removal of amoxicillin (93 %) was achieved at contact time = 240 min, pH = 10, agitation speed = 200 rpm, initial concentration = 30 ppm, and adsorbent dosage = 3 g bentonite per 1L of pollutant solution. The characterization of the adsorbent, modi

... Show More
View Publication
Scopus (25)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Features tendency cosmic in contemporary Iraqi configuration
...Show More Authors

The research current ( features tendency cosmic in contemporary Iraqi configuration) attempt to study the dimensions of the conceptual and philosophical foundations upon which the tendency of cosmic within the period that extended its influence beyond the place where I grew up to be circulated concepts in all parts of the world, it is no doubt that the world is now heading to rapprochement after the tremendous developments in the field of communication technology and reflected heavily on identity concepts, privacy, the concept of nation-states ... etc. to become an individual and a large area of access to other cultures, and all that aroused the interest of contemporary Iraqi artist this interest arising from the desire to keep up with d

... Show More
View Publication Preview PDF
Crossref