Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is applied to generate pseudo-random keys that produce more complexity for the proposed cipher algorithm. The goal of the proposed algorithm is to present a hybrid algorithm by enhancing the complexity of the current PRESENT algorithm while keeping the performance of computational operations as minimal. The proposed algorithm proved working efficiently with fast executed time, and the analyzed result of the generated sequence keys passed the randomness of the NIST suite.
This paper proposes a self organizing fuzzy controller as an enhancement level of the fuzzy controller. The adjustment mechanism provides explicit adaptation to tune and update the position of the output membership functions of the fuzzy controller. Simulation results show that this controller is capable of controlling a non-linear time varying system so that the performance of the system improves so as to reach the desired state in a less number of samples.
......
The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
Background: The aryl hydrocarbon receptor (AhR) is a ligand-activated transcription factor historically recognized for its role in the regulation of toxicity mediated by environmental chemicals. Recent research points to AhR's critical participation in male reproductive physiology, particularly in spermatogenesis, hormone signaling, and the maintenance of sperm quality. Both endogenous ligands (e.g., dietary and gut microbiota-derived metabolites) and exogenous pollutants (e.g., dioxins and benzo-α-pyrene) influence AhR-mediated pathways, making it a key link between environmental exposures and male fertility. Results: This review highlights AhR's influence on the male reproductive system, emphasizing the role of endogenous AhR ligands an
... Show MoreA three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show MoreAbstract:
The researcher shed light on a diet in Iraq before 2003 became in this period. And how the ration card has a variety of vocabulary and cover the need of the population of commodities and have a key role in saving Iraq from a real crisis in the period of economic siege, especially in light of the State's direction to support the agricultural sector, which in that period able to fill half of the market needs of food the basic. As well as providing strategic storage at the Ministry of Commerce enough for six months But after the events of 2003 and the crises that hit the country and the unstable security situation began to rise voices calling for reform of the ration card system as a system that is a burden on the
... Show MoreBackground: Oral squamous cell carcinoma (OSCC) remains a lethal and deforming disease, with a significant mortality and a rising incidence in younger and female patients. It is thus imperative to identify potential risk factors for OSCC and oral PMDs and to design an accurate data collection tool to try to identify patients at high risk of OSCC development. 14 factors consistently found to be associated with the pathogenesis of OSCC and oral PMDs. Eight of themwere identified as high risk (including tobacco, alcohol, betel quid, marijuana, genetic factors, age, diet and immunodeficiency) and 6 low risk (such as oral health, socioeconomic status, HPV, candida infection, alcoholic mouth wash and diabetes) were stratified according to severit
... Show More