Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is applied to generate pseudo-random keys that produce more complexity for the proposed cipher algorithm. The goal of the proposed algorithm is to present a hybrid algorithm by enhancing the complexity of the current PRESENT algorithm while keeping the performance of computational operations as minimal. The proposed algorithm proved working efficiently with fast executed time, and the analyzed result of the generated sequence keys passed the randomness of the NIST suite.
This study focused on treatment of real wastewater rejected from leather industry in Al-Nahrawan city in Iraq by Electrocoagulation (EC) process followed by Reverse Osmosis (RO) process. The successive treatment was applied due to high concentration of Cr3+ ions (about 1600 ppm) rejected in wastewater of this industry and for applying EC with moderate power consumption and better results of produced water. In Electrocoagulation process (EC), the effect of NaCl concentration (1.5, 3 g/l), current density (C.D.) (15-25 mA/cm2), electrolysis time (1-2 h), and distance between electrodes (E.D.) (1-2 cm) were examined in a batch cell by implementing Taguchi experimental design. According to the results obtained from multiple regression and signa
... Show MoreAtmospheric residue fluid catalytic cracking was selected as a probe reaction to test the catalytic performance of modified NaY zeolites and prepared NaY zeolites. Modified NaY zeolites have been synthesized by simple ion exchange methods. Three samples of modified zeolite Y have been obtained by replacing the sodium ions in the original sample with lanthanum and the weight percent added are 0.28, 0.53, and 1.02 respectively. The effects of addition of lanthanum to zeolite Y in different weight percent on the cracking catalysts were investigated using an experimental laboratory plant scale of fluidized bed reactor.
The experiments have been performed with weight hourly space velocity (WHSV) range of 6 to 24 h
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreThis study was conducted at the College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad. The aim of this study was to isolate and diagnose fungi from fish feedstuff samples, and also detection of aflatoxin B1 and ochratoxin A in fish muscles and feedstuffs. Randomly, the samples were collected from some fish farms from Baghdad, Babil, Wasit, Anbar, and Salah al-Din provinces. This study included the collection of 35 feedstuff samples and 70 fish muscle samples, and each of the two fish samples fed on one sample of the feedstuff. The results showed the presence of several genera of different fungi including Aspergillus spp, Mucor spp., Penicillium spp., Yeast spp., Fusarium spp., Rhizopus spp., Scopiolariopsis spp., Ep
... Show MoreThe aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys
... Show MoreIdentification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed
... Show MoreThe rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme
High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination
... Show MoreIn many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show MoreIn this work, Elzaki transform (ET) introduced by Tarig Elzaki is applied to solve linear Volterra fractional integro-differential equations (LVFIDE). The fractional derivative is considered in the Riemman-Liouville sense. The procedure is based on the application of (ET) to (LVFIDE) and using properties of (ET) and its inverse. Finally, some examples are solved to show that this is computationally efficient and accurate.