Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
Praise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u
... Show MoreIn this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreDBN Rashid, Al- Utroha Journal, 2018
Luminescent sensor membranes and sensor microplates are presented for continuous or high-throughput wide-range measurement of pH based on a europium probe.
This study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.
This paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.
Experimental results shows LPG-
... Show MoreIn this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.
... Show MoreThis article comprehensively examines the history, diagnosis, genetics, diversity, and treatment of SARS-CoV-2. It details the emergence of coronaviruses over the past 50 years, including the coronavirus from 2019 and its subsequent mutations, along with updated information about this virus. This review explains the development and nomenclature of coronaviruses, their cellular invasion through glycoprotein spikes binding to ACE-2 receptors, and the mechanism of cell entry via endocytosis. Diagnosis methods for COVID-19, including nucleic acid amplification, serology, and imaging techniques like chest X-ray and CT scan tests, are discussed. Treatment approaches for COVID-19 are outlined, emphasizing healthcare, antiviral medications like Rem
... Show MoreBackground: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis
... Show MoreThis study seeks to examine the language context of the prominent Revolution’s poet, Moufdi Zakaria, in his anthology “ The Algerian Odyssey " )إلياذة الجزائر( in which he makes use of the Coranic terms explicitly and implicitly. Besides, it seeks to explore the content of his terms from a lexicographic and semantic point of view in their Islamic and human dimensions