Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreVariation orders are an on-going phenomenon in construction and industry projects worldwide, particularly in the province of Sulaimani, where the project's damage from cost and schedule overrun because of variation orders. However, the effect on project costs and time overrun of variation order has yet to be identified. This study evaluates the impact of variation orders on the cost and time off in the Sulaimani governorate. Two hundred twenty-eight projects from various construction sectors built between 2007-2012 were adopted to calculate the contract cost and schedule overruns due to variation orders. Data analysis was applied in the study were descriptive statistics. One-way ANOVA was also applied to determine w
... Show MoreThe features of the actor's performance in the ritual theater are of great importance and chief in theatrical work since the first emergence of the theater, as the features of the performance were embodied in all Iraqi theatrical performances, but they took personal privacy in some ritual performances because of their differences and similarities between the ritual theatrical performance and the ritual show Al-Khalis, who wanted the researcher to know the similarities and differences in the features of the ritual performance and in the theatrical performance, despite the many transformations that occurred in the theater and affected the features of the performance, but it remained an important and attractive link between the recipient, t
... Show MoreThe paper deals with a study of peculiarities of gluttonic text structures in the Arabic-Russian language pair at the sociolinguistic, system structural, functional-stylistic and lexico-semantic aspects from the standpoint of view at functional approach to the phenomena of language systems and the gluttonic discourse as a special type of ver bal and social discourse. Profound attention is paid to the consideration of lexical and grammatical means of explication of glutton discourse on the examples of identi cal Arabic and Russian literary texts as well as language situations in Arab countries and Russia, features of which are due to the characteristics of gluttonic discourses that reflect the features of the two different ethnolingual cu
... Show MoreThe need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services
... Show MoreResearch summary
The Quranic discourse focused on a lot of vocabularies that carry goals that help man to acquire good, according to a methodology relies on adopting lofty ideas and values. The individual towards society, and the responsibility of society towards the individual. In our present age, the Muslim individual lives in a state of confrontation with deviant ideas, which unfortunately possess the means that make their impact great on society. The study concluded that the Holy Quran contains indicators and determinants of misguided and deviant thought, Which must be avoided because of the seriousness of its effects. Religion, in its general sense, represents a culture that transcends the limits of human ins
... Show MoreThe measurement data of the raw water quality of Tigris River were statistically analyzed to measure the salinity value in relation to the selected raw water quality parameters. The analyzed data were collected from five water treatment plants (WTPs) assembled alongside of the Tigris River in Baghdad: Al-Karkh, Al-Karama, Al-Qadisiya, Al-Dora, and Al-Wihda for the period from 2015 to 2021. The selected parameters are total dissolved solid (TDS), electrical conductivity (EC), pH and temperature. The main objective of this research is to predicate a mathematical model using SPSS software to calculate the value of salinity along the river, in addition, the effect of electrical conductivi