Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is applied to generate pseudo-random keys that produce more complexity for the proposed cipher algorithm. The goal of the proposed algorithm is to present a hybrid algorithm by enhancing the complexity of the current PRESENT algorithm while keeping the performance of computational operations as minimal. The proposed algorithm proved working efficiently with fast executed time, and the analyzed result of the generated sequence keys passed the randomness of the NIST suite.
In the last few years, following the relative stability of the political, economic, and security environments, Iraq has embarked on a transformation towards an ambitious program of automation across various sectors. However, this automation program faces numerous challenges, including significant investments in technology and training, addressing social impacts, and combating widespread illiteracy
Geographical, economic, historical, environmental and security factors play a role in strengthening the drive towards union, as well as addressing the need to express regional and federal identity. This is a clear example of this tendency. One legal or one political system with the parts of this united personality retaining their privacy and identity, and there is a delegation to the central entity of the union with some of the common powers while retaining some powers for these parts or states, which means the availability of autonomy for the constituent states of the union and this is the most important characteristic of the federal states or federations It is the autonomy of each state or country participating in the union. Accordingly,
... Show MoreA total of 247 specimens of the Mallard were collected from Baghdad city and kut City and 154 specimens the collection was started from October1999
Background: Repeated blood transfusion is the main therapeutic option for transfusion-dependent anaemias with consequent iron overload and organ damage .Therefore iron chelating agents are important protective measures for these patients. The aim of this study was to investigate the efficiency and safety of Desferroxamine in paediatrics population subjected to iron overload as a consequence of repeated transfusion in a group of Sudanese children Subjects & Methods: This was a descriptive cross-sectional hospital based study. Conducted in two main paediatric reference hospitals in, Su |
The aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of c
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More