Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is applied to generate pseudo-random keys that produce more complexity for the proposed cipher algorithm. The goal of the proposed algorithm is to present a hybrid algorithm by enhancing the complexity of the current PRESENT algorithm while keeping the performance of computational operations as minimal. The proposed algorithm proved working efficiently with fast executed time, and the analyzed result of the generated sequence keys passed the randomness of the NIST suite.
The problem of the research lies in finding aiding means that improve and facilitate learning artistic skills during the main part of a teaching sessions due to their great importance in developing the accuracy of forehand and backhand skills in tennis. Players are usually faced with difficulties at the beginning of learning due to lack of coordination in ball striking thus including a teaching aid will have a positive effect on learning some forehand and backhand skills. The research aimed at designing exercises using teaching aid in tennis as well as identifying the effect of these exercises on the accuracy of performing forehand and backhand shots in tennis. The researcher used the experimental method on (38) tennis players from Al Zewra
... Show MoreThis study deals with the corrosion inhibition of metal corrosion process of medium carbon steel using 1M HCl for kinetic studies and rate reaction determination. The weight loss method is applied to pieces of Medium carbon steel divided to Cubans with dimensions (0.4*2*2.4) cm , and use Tafel Extrapolation Method, the samples were polished using carbide silicon paper with dimensions of (180,200,400,600,800,1000). The samples were immersed in the alcoholic medium ethanol at a temperature 293K for 3hr. Natural inhibitor Kujarat Tea (Hibiscus sabdarriffa L.) is used which is extracted in aqueous and alcoholic medium, different concentrations (1000،2000, 3000) ppm have been used ; The best concentration found through the results is a
... Show MoreThis study deals with the corrosion inhibition of metal corrosion process of medium carbon steel using 1M HCl for kinetic studies and rate reaction determination. The weight loss method is applied to pieces of Medium carbon steel divided to Cubans with dimensions (0.4*2*2.4) cm , and use Tafel Extrapolation Method, the samples were polished using carbide silicon paper with dimensions of (180,200,400,600,800,1000). The samples were immersed in the alcoholic medium ethanol at a temperature 293K for 3hr. Natural inhibitor Kujarat Tea (Hibiscus sabdarriffa L.) is used which is extracted in aqueous and alcoholic medium, different concentrations (1000،2000, 3000) ppm have been used ; The best concentration found through the results is a conce
... Show MoreIn this study, the aqueous extract of (Typha domingensis Pers.) pollen grain (qurraid) to know its ability to manufacture silver nanoparticles. Qurraid is a semi-solid yellow food substance, sold in Basra markets and eaten by the local population. It is made from the pollen of the T. domingensis Pers. plant after being pressed and treated with water vapor. The Gas chromatography–mass spectrometry (GC-MS) reaction was done to identify the active compounds of qurraid aqueous extract. The ability of the aqueous extract of qurraid to manufacture silver nanoparticles was tested, and the construction of silver nanoparticles was inferred by the reaction mixture's color, which ranged from yellow to dark brown. The synthesi
... Show MoreThe current study was conducted in Baghdad governorate (Karkh and Al-Rasafa regions) which included collecting 50 samples of freshly slaughtered sheep meat randomly collected from local slaughter areas and approved governmental slaughterhouses (25 liver and 25 ulna muscles). The results of the aflatoxin B1 detection showed that all samples were contaminated with this toxin at different concentrations ranging from 25–422 ppb and 65–492 ppb for each ulna muscles and liver, respectively. The histopathological and immunological study was conducted in meat samples containing higher and lower concentrations of the toxin. The results of the pathological study in the liver revealed that the concentration (492 ppb) caused thickening of t
... Show MoreDouble hydrothermal method was used to prepare nano gamma alumina using aluminum nitrate nano hydrate and sodium aluminate as an aluminum source, CTAB (cetyltrimethylammonium bromide) as surfactant, and variable acids: weak acids like; citric, and acitic acids, and strong acids like; hydrochloric and nitric acids as a bridge between aluminum salts and surfactant. Different crystallization times 12, 24, 48, and 72 hrs were applied. All the batches were prepared at pH equals to 9. XRD diffraction technique was used to investigate the crystalline nano gamma alumina pure from surfactant. N2 adsorption-desorption (BET) was used to measure the surface area and pore volume of the prepared nano alumina, the average p
... Show MoreIn the present work, the magnetic dipole and electric quadrupole moments for some sodium isotopes have been calculated using the shell model, considering the effect of the two-body effective interactions and the single-particle potentials. These isotopes are; 21Na (3/2+), 23Na (3/2+), 25Na (5/2+), 26Na (3+), 27Na (5/2+), 28Na (1+) and, 29Na (3/2+). The one-body transition density matrix elements (OBDM) have been calculated using the (USDA, USDB, HBUMSD and W) two-body effective interactions carried out in the sd-shell model space. The sd shell model space consists of the active 2s1/2, 1d5/2,
... Show MoreThis study investigated the effect of using brainstorming as a teaching technique on the students’ performance in writing different kinds of essays and self regulation among the secondary students. The total population of this study, consisted of (51) female students of the 5th Secondary grade in Al –kawarzmi School in Erbil during the academic year 2015-2016. The chosen sample consisted of 40 female students, has been divided into two groups. Each one consists of (20) students to represent the experimental group and the control one. Brainstorming technique is used to teach the experimental group, and the conventional method is used to teach the control group. The study inst
... Show MoreThis work aimed to study the effect of laser surface treatment on the mechanical characteristics and corrosion behaviour of grey cast iron type A159. Many technical applications used conventional surface treatment, but laser surface hardening has recently been used to enhance the surface properties of many alloys. The mechanical characteristics, including microstructure, microhardness, and wear resistance of A159 grey cast iron, were studied, in addition to corrosion behaviour. The experimental laser parameters in this work were 0.9, 1.2, and 1.5 KW power with continuous wave carbon dioxide lasers with scanning speeds of 10 and 12 mm/s were used. The results found that phase-transitional alterations in microstructure were influenced by lase
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper