Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
The research problem lies in the ambiguity of the usage of propaganda contents by two main media outlets (the Russian RT and American Alhurra) in their news coverage of the Syrian crisis through their websites and the methods used by them to convince users taking into account the mutual propaganda conflict between the United States and Russia in the war against Syria. The objectives of the research can be represented by the following: investigating the contents of American and Russian electronic propaganda towards Syrian crisis.
• Identifying the contents that received most of the coverage in the Syrian crisis by the two news outlets.
• Identifying the terms and phrases that have been most used by the websites of RT and Alhurr
In this review, previous studies on the synthesis and characterization of the metal Complexes with paracetamol by elemental analysis, thermal analysis, (IR, NMR and UV-Vis (spectroscopy and conductivity. In reviewing these studies, the authors found that paracetamol can be coordinated through the pair of electrons on the hydroxyl O-atom, carbonyl O-atom, and N-atom of the amide group. If the paracetamol was a monodentate ligand, it will be coordinated by one of the following atoms O-hydroxyl, O-carbonyl or N-amide. But if the paracetamol was bidentate, it is coordinated by atoms (O-carbonyl and N-amide), (O-hydroxyl and N-amide) or (O-carbonyl and O-hydroxyl). The authors also found that free paracetamol and its complexes have antimicrobial
... Show MoreMT Suhail, SA Hussein, MN Abdulhussein, WQ Abdaullateef, M khairallah Aid…, Migration Letters, 2024
Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO2 nanofilms. The results show different opacity behaviors at different w
Terrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.
In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou
... Show MoreThis research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions: Is it possible to examine praise poetry as a tagmeme? Is this analysis of great help in teaching English and Arabic to students in the College of Education? The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9. Each line in both English and Arabic data is numbered by the researcher herself. Then, those lines are grouped into sentences to facilitat
... Show MoreOne of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThis research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:
- Is it possible to examine praise poetry as a tagmeme?
- Is this analysis of great help in teaching English and Arabic to students in the College of Education?
The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.
&nbs
... Show More