Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is applied to generate pseudo-random keys that produce more complexity for the proposed cipher algorithm. The goal of the proposed algorithm is to present a hybrid algorithm by enhancing the complexity of the current PRESENT algorithm while keeping the performance of computational operations as minimal. The proposed algorithm proved working efficiently with fast executed time, and the analyzed result of the generated sequence keys passed the randomness of the NIST suite.
Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreA cost-effective and efficient detector was created to conduct thorough turbidimetric measurements by reaction of Co (II) ion with calcium ferro cyanide to form bright green particulate, using the method of continuous flow injection analysis, the use of NAG-5SX1-1D-SSP Analyzer in determining cobalt (II) ion in a test for the validity of the new design. The NAG-5SX1-1D-SSP Analyzer is composed of five irradiation sources of white snow leds having the diameter of 10 mm with one solar cell of 55 mm length, 13.5 mm width. Using a selector switch to select the optimum voltage to be used which was 2.7 VDC. Under conditions of optimization, cobalt (II) ion was determined at 0.005–20 mmol. L–1(n = 23) while linearity dynamic range 0.005–7 mm
... Show MoreThe results of the current study showed that the liver of H. javanicus appeared as large lobulated organ divided into six distinct lobes, that filled the cranial region and little extended to the middle region of abdominal cavity. On the other hand, liver of S. carolinensis laid against the diaphragm, occupied the cranial region of the abdominal cavity and consisted of five lobes. The liver is surrounded with a thin capsule of dense regular collagenous connective tissue and few numbers of smooth muscles fibers can be seen in the capsule that covered the squirrel liver. The liver parenchyma divided into a large number of interconnected hepatic lobules marked only by the abundant amount of connective tissue bordered the triads, and within the
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreBackground: Optimal root canal retreatment was required safe and efficient removal of filling material from root canal. The aim of this in vitro study was to compare the efficacy of reciprocating and continuous motion of four retreatment systems in removal of root canal filling material. Materials and Methods: Forty distal roots of the mandibular first molars teeth were used in this study, these roots were embedded in cold clear acrylic,roots were instrumented using crown down technique and rotary ProTaper systemize Sx to size F2 ,instrumentation were done with copiousirrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilledwater, roots were obturated with AH26 sealer and Prota
... Show MoreBackground: Optimal root canal retreatment was required safe and efficient removal of filling material from root canal. The aim of this in vitro study was to compare the efficacy of reciprocating and continuous motion of four retreatment systems in removal of root canal filling material. Materials and Methods: Forty distal roots of the mandibular first molars teeth were used in this study, these roots were embedded in cold clear acrylic,roots were instrumented using crown down technique and rotary ProTaper systemize Sx to size F2 ,instrumentation were done with copiousirrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilledwater, roots were obturated with AH26 sealer and Prota
... Show MoreThe primary goal of in-situ load testing is to evaluate the safety and performance of a structural system under particular loading conditions. Advancements in building techniques, analytical tools, and monitoring instruments are prompting the evaluation of the appropriate loading value, loading process, and examination criteria. The procedure for testing reinforced concrete (RC) structures on-site, as outlined in the ACI Building Code, involves conducting a 24-h load test and applying specific evaluation criteria. This article detailed a retrofitting project for an RC slab-beams system by utilizing carbon fiber-reinforced polymer (CFRP) sheets to strengthen the structure following a fire incident. The RC structure showed indicators of deter
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More