Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
The uniform flow distrbiution in the multi-outlets pipe highly depends on the several parameters act togather. Therefor, there is no general method to achieve this goal. The goal of this study is to investigate the proposed approach that can provide significant relief of the maldistribution. The method is based on re-circulating portion of flow from the end of the header to reduce pressure at this region . The physical model consists of main manifold with uniform longitudinal section having diameter of 152.4 mm (6 in), five laterals with diameter of 76.2 mm (3 in), and spacing of 300 mm. At first, The experiment is carried out with conventional manifold, which is a closed-end. Then, small amount of water is allowed
... Show MoreThe negotiation phase is gaining great importance in investment loans due to the magnitude of the amounts awarded and the need to obtain adequate lending guarantees and the development of better conditions, and this requires that negotiating policy with fixed principles that balance between meeting the demands of customers and maintain market share and achieve profits and avoid defaults and losses the bank, and so I have touched Find the concept of investment loans and procedures for granting and the concept of the negotiation process for the granting of loans. The practical side to ensure the preparation of examination form consists of questions commensurate with the methodology developed by the researchers, were directed to the officia
... Show MoreThe summary:
This research paper presents a standard economic study. This study aims to build an economic standard form of the investment effect in Human Capital on Economic Growth in Algeria. The study showed that there is an inverse relationship between the investment and human capital. This is expressed by expending on education and economic growth. This contradicts with the economic theory. Such matter could be explained by that expending on education does not contribute in the economic growth. This refers to that the education sector result does not employee or save jobs. Thus, it does not contribute in growth; in addition, the Algerian economy depends on petrol in the first class. This means the ab
... Show MoreOf the new concepts introduced by the decree of the amendment of the French Civil Code No. 131-2016 issued on 10 February 2016, which raised a debate in jurisprudence both at the level of French jurisprudence or the Arab, the concept of (the content of the contract), which seems to have emerged from the appearance of new legal articles ( 1162-1171) is the cornerstone of the contract and the contract in the contract, the two pillars which, over the course of 200 years and a half, have been one of the main pillars of the codification of Napoleon. Is that the decree of amendment has already abandoned these two pillars, or most of what he did is a change in terminology while preserving the content of these two pillars implicitly, this is what w
... Show More|
The speech delivered by political blocs and parties and broadcasted by satellite channels, social and communication media has different ideologies and orientations: moderate speech calling for calm or one raising crises.The latter is considered very challenging due to its local and international reference., this paper aims at uncovering these challenges especially during the political crisis witnessed in Iraq. This paper sheds light on the most important crisis that spread in public opinion, broadcasted by satellite, and raised by politicians who are competing to gain authority leading to a lack of peoples, confidence in them.This matter should not be neglected at all; e |
Takbiratul Ehram "The First Takbeer to Start Prayer" means: the words that the worshiper says to start his prayers, and refrain from anything invalidates it. the findings revealed that the four school jurists agreed that the prayer is not valid without Takbiratul Ehram "The First Takbeer to Start Prayer", and they disagreed on its description, so the majority of jurists said that it is a pillar, and some of them called it an obligatory, but Hanafi made it a condition. Likewise, the four jurists agreed that the one who articulates Takbiratul Ehram "The First Takbeer to Start Prayer" with the word: “Allahu Akbar,”; his Takbeer is correct, and they disagreed about the one who adds a word, or replaced it with another, where the m
... Show MoreRandom laser gain media is synthesized with different types of dye at the same concentration (1×10-3 M) as an active material and silicon dioxide NPs (silica SiO2) as scatter centers through the Sol-Gel technique. The prepared samples are tested with UV–Vis spectroscopy, Fluorescence Spectroscopy, Field Emission Scanning Electron Microscopy (FESEM), and Energy Dispersive X-ray Diffraction (EDX). The end result demonstrates that doped dyes with silica nanoparticles at a concentration of 0.0016 mol/ml have lower absorbance and higher fluorescence spectra than pure dyes. FESEM scans revealed that the morphology of nanocrystalline silica is clusters of nano-sized spherical particles in the range (25-67) nm. It is con
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Abstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show More