Preferred Language
Articles
/
nBboCocBVTCNdQwCYDKb
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.

Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Pharmaceutical Research
New method for the evaluation of propranolol with phosphotungstic acidvialong distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis
...Show More Authors

A new, simple and sensitive method was used forevaluation of propranolol withphosphotungstic acidto prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between propranolol and phosphotungstic acid in an aqueous medium to obtain a yellow precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.007-13 mmol/L for cell A and 5-15 mmol/L for cell B, and LOD 207.4792 ng/160 µL and 1.2449 µg/160 µL respectively to cell A and cell B with correlation coefficient (r) 0.9988 for cell A, 0.9996 for cell B, RSD% was lower than 1%, (n=8) for the

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Performance Equations for Household Compressors Depending on Manufacturing Data for Refrigerators and Freezers
...Show More Authors

Abstract

 A surface fitting model is developed based on calorimeter data for two famous brands of household compressors. Correlation equations of ten coefficient polynomials were found as a function of refrigerant saturating and evaporating temperatures in range of (-35℃ to -10℃) using Matlab software for cooling capacity, power consumption, and refrigerant mass flow rate.

Additional correlations equations for these variables as a quick choice selection for a proper compressor use at ASHRAE standard that cover a range of swept volume range (2.24-11.15) cm3.

The result indicated that these surface fitting models are accurate with in ± 15% for 72 compressors model of cooling cap

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 16 2017
Journal Name
Joiv : International Journal On Informatics Visualization
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment
...Show More Authors

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Water security in Basra Study economic reality and prospects for future water
...Show More Authors

It  can be said that the Security of water  in  Basra from the visual task vital strategic issues of concern to the attention of researchers in various attributions and those interested in water, environmental, economic, social, cultural and political affairs ... etc. This view of the great importance of the issue of water in the occupied Basra, which is characterized by parochialism and scarcity, When looking at the sources of our daily lives and in our reality today. We find that millions of people living on the two main exporters Tabaaan oil and water. And depleted oil wealth However Manfred him the most attention because we entered it surpasses all other sources of income, but is not it a littl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 15 2025
Journal Name
Smart Innovation, Systems And Technologies
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Iraq's role in US security arrangements In the Greater Middle East project
...Show More Authors

إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Advanced Security Technique in Presence of Open Communication System and Cyber Era
...Show More Authors

View Publication
Scopus Crossref