14 research outputs found

    Cryptographic key Generation Using Fingerprint Biometrics

    Get PDF
    At the present time progress of communications technologies has resulted to post large amounts of digital data in the media shared among the people, this has necessitated the development of cryptographic techniques to be one of the building blocks for the security of the computer, so that became the encryption feature increasingly important to the security of the computer. This paper proposed a method for generating a key using fingerprint features to ensure the security of the system against hackers. This technical consists of two parts the first is the EPROM memory filled with information of fingerprint after processed by the enhancement, binarization and thinning operations and then 512 numeric values has been extracted. The second part is a set of linear shift registers where every movement for system registers is an address in the memory where the dimensions of memory (8x64), the first three registers give the row address while the registers ordered by two to seven give the column address of EPROM array. The strength of the chain of random numbers which produced by making originating from two different worlds linked to the same user, is a goal makes this technique useful for several uses, such as using output as encryption keys, or use it as a digital series for personal definition for security systems

    Cryptographic key Generation Using Fingerprint Biometrics

    Get PDF
    At the present time progress of communications technologies has resulted to post large amounts of digital data in the media shared among the people, this has necessitated the development of cryptographic techniques to be one of the building blocks for the security of the computer, so that became the encryption feature increasingly important to the security of the computer. This paper proposed a method for generating a key using fingerprint features to ensure the security of the system against hackers. This technical consists of two parts the first is the EPROM memory filled with information of fingerprint after processed by the enhancement, binarization and thinning operations and then 512 numeric values has been extracted. The second part is a set of linear shift registers where every movement for system registers is an address in the memory where the dimensions of memory (8x64), the first three registers give the row address while the registers ordered by two to seven give the column address of EPROM array. The strength of the chain of random numbers which produced by making originating from two different worlds linked to the same user, is a goal makes this technique useful for several uses, such as using output as encryption keys, or use it as a digital series for personal definition for security systems

    Some Estimation Methods for the Shape Parameter and Reliability Function of Burr Type XII Distribution / Comparison Study

    Get PDF
    Burr type XII distribution plays an important role in reliability modeling, risk analyzing and process capability estimation. The choice of the best estimation method is one of the goals in estimating parameters of the distribution. The main aim of this paper is to obtain and compare the classical "maximum likelihood and uniformly minimum variance unbiased" estimators and the Bayesian estimators of the shape parameter, ???? and reliability function based on a complete sample when the other shape parameter, ? known. The Bayes estimators are obtained under non-informative priors "Jeffrey’s prior, modified and extension of Jeffrey’s prior" as well as under informative gamma prior based on different symmetric and asymmetric loss functions "squared error, quadratic, LINEX, precautionary and entropy". The Monte Carlo experiment was performed under a wide range of cases and sample size. The estimates of the unknown shape parameter were compared by employing the mean square errors and the estimates of reliability function were compared by employing the integrated mean squared error.   Keywords: Burr type XII distribution; Maximum likelihood estimator; Uniformly Minimum Variance Unbiased estimator; Bayes estimators; non-informative Prior; informative Prior; Squared error loss function; quadratic loss function; LINEX loss function; Precautionary loss function; Entropy Loss function; Mean squared error; integrated mean squared error

    Enhanced Road Network to Reduce the Effect of (External – External) Freight Trips on Traffic Flow

    Get PDF
    The transportation system is often described as the lifeblood of modern society. Roads constitute a fundamental part of this system for both passenger and freight transports, a well-functioning freight transportation system is an essential element in any successful economy. Hilla is one of the most densely populated cities in Iraq. The road network in Hilla city is under additional load due to (external - external) trips, especially freight trips by trucks passing through the city's main entrances to cross into neighboring districts and provinces. This is due to the city's strategic location, which connects Baghdad with the southern provinces, making it an important transit route. The objective of this research is to study a proposal for modifying and developing the road network in the city of Hilla by adding new roads to the current network in order to reduce the negative impact of freight trucks passing through the city, especially (external - external) trips, by using Trans CAD and ArcGIS software network analysis. The result of network analysis shows that the suggested roads will reduce the total (travel time and distance) for the same origin and destination points by 9%, and 30%, compared with the current distance and time, respectively, while improving the level of service from D to C at peak hours for freight vehicles. Doi: 10.28991/CEJ-2022-08-11-015 Full Text: PD

    Comparison of Weibull and Fréchet distributions estimators to determine the best areas of rainfall in Iraq

    Get PDF
    In this research, an appropriate distribution of the amount of rain will be found in the Iraqi governorates for the period (2006-2014) and the researcher used two important distributions, namely, the Weibull distribution and the Fréchet distribution. Where the specific distribution was determined based on the minimum criteria (the criteria of goodness of fit) and the tests used are the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC). Rainfall in the Iraqi governorates for the stations (Mosul, Kirkuk, Tikrit, Khanaqin, Rutba, Baghdad, Karbala) is a Weibull distribution using the greatest possible estimation method, while the stations in other provinces (Najaf, Diwaniyah, Maysan, Basra) the Fréchet distribution was the distribution It is better to represent the data of these stations using the method of estimating the greatest possible as well. We also note the superiority of the method of maximum likelihood of least squares

    A Haptic feedback system based on leap motion controller for prosthetic hand application

    Get PDF
    Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (FSR) and vibro-motors in which the speed of these motors is proportional to the amount of the grasp force exerted by the prosthetic hand. Investigation for optimal placement of the FSRs on a prosthetic hand to obtain convenient haptic feedback has been carried out. The results show the effect of object shape and weight on the obtained response of the FSR and how they influence the locations of the sensors

    Category Theory and New Classes of Semi Bornological Group

    No full text
    Because, the new knowledge put every new structure in category theory. So, became a source of interest for many researchers, to put every new structure in category theory. This motivates us to put the new structures of semibornological group in category. Furthermore, new classes of semibornological group was constructed, which it is a semibornological group with respect to S-bounded maps and semibornological groups with respect to S**-bounded maps. The main important results, every semi bornological group is S-semi bornological group and S**-semi bornological group but the converse is not true. Also, we gave the certain condition for any codomain of S-semi bornological group to be S**-semi bornological group. Additionally, every left (right) translation is S-bornological isomorphism and S**-bornological isomorphism, every bornological isomorphism is S-bornological isomorphism and S**-bornological isomorphism

    Evaluating Healthcare System Based SD-WAN Backbone

    No full text
    The development of information technology in the last few years led healthcare services to becomes more dependent on it, but the complexity of the current network is more susceptible to failure and causes interruption of the health services. SDN brought larger flexibility for network providers and enabled an improvement of the user’s experience for diverse data network services. Correspondingly, SDN delivered the flexibility for health care providers and improved the health state of their users. The aim of this paper is building a reliable SDN, optimizing controller application, building custom topology, test methodology, results from analysis ,to choosing the most suitable windows size and buffer size for the transfer medical data of SDN and give advice to researcher and Companies when build real SDN operating hospital. The major objective was to evaluate the Healthcare system over SD-WAN. This was applied by measuring the communication and the bandwidth between nodes; in addition to this we measured the latency, RTT and jitter for TCP and UDP protocols with Background traffic which variety from 20% to 70%using iperf, jperf and capturing in wireshark. The results show a noticeable diversity in different protocols. The carried-out investigation reveal that the performance of TCP is more reliable and suited for the transfer of medical data with the conclusion that background traffic and windows size in TCP have an inverse relationship. UDP Functions the best at a buffer size of 10, 30 KBin order to transmit medical data on real time with low packet loss

    Impact of Ebola and COVID-19 on maternal, neonatal, and child health care among populations affected by conflicts: a scoping review exploring demand and supply-side barriers and solutions

    Get PDF
    IntroductionArmed conflicts have a severe impact on the health of women and children. Global health emergencies such as pandemics and disease outbreaks further exacerbate the challenges faced by vulnerable populations in accessing maternal, neonatal, and child healthcare (MNCH). There is a lack of evidence that summarizes the challenges faced by conflict-affected pregnant women, mothers, and children in accessing MNCH services during global health emergencies, mainly the Ebola and COVID-19 pandemics. This scoping review aimed to analyze studies evaluating and addressing barriers to accessing comprehensive MNCH services during Ebola and COVID-19 emergencies in populations affected by conflict.MethodsThe search was conducted on PubMed, Scopus, and Web of Science databases using terms related to Ebola and COVID-19, conflicts, and MNCH. Original studies published between 1990 and 2022 were retrieved. Articles addressing the challenges in accessing MNCH-related services during pandemics in conflict-affected settings were included. Thematic analysis was performed to categorize the findings and identify barriers and solutions.ResultsTwenty-nine studies met the inclusion criteria. Challenges were identified in various MNCH domains, including antenatal care, intrapartum care, postnatal care, vaccination, family planning, and the management of childhood illnesses. Ebola-related supply-side challenges mainly concerned accessibility issues, health workforce constraints, and the adoption of stringent protocols. COVID-19 has resulted in barriers related to access to care, challenges pertaining to the health workforce, and new service adoption. On the demand-side, Ebola- and COVID-19-related risks and apprehensions were the leading barriers in accessing MNCH care. Community constraints on utilizing services during Ebola were caused by a lack of trust and awareness. Demand-side challenges of COVID-19 included fear of disease, language barriers, and communication difficulties. Strategies such as partnerships, strengthening of health systems, service innovation, and community-based initiatives have been employed to overcome these barriers.ConclusionGlobal health emergencies amplify the barriers to accessing MNCH services faced by conflict-affected populations. Cultural, linguistic, and supply-side factors are key challenges affecting various MNCH domains. Community-sensitive initiatives enhancing primary health care (PHC), mobile clinics, or outreach programs, and the integration of MNCH into PHC delivery should be implemented. Efforts should prioritize the well-being and empowerment of vulnerable populations. Addressing these barriers is crucial for achieving universal health coverage and the Sustainable Development Goals
    corecore