Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn this study, a one-dimensional model represented by Butler-Volmer-Monod (BVM) model was proposed to compute the anode overpotential and current density in a mediator-less MFC system. The system was fueled with various organic loadings of real field petroleum refinery oily sludge to optimize the favorable organic loading for biomass to operate the suggested system. The increase in each organic loading showed higher resistance to electrons transport to the anode represented by ohmic loss. On the contrary, both activation and mass transfer losses exhibited a noticeable decrement upon the increased organic loadings. However, current density was improved throughout all increased loads achieving a maximum current density of 5.2 A/m3
... Show MoreThe objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w
... Show MoreThere are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com
... Show MoreBackground: Incorporation of chemical additives has long been a technique used to improve properties of the gypsum products. The purpose of this work was to study the effects of adding a combination of gum Arabic and calcium hydroxide to a type III dental stone and type IV improved die stone with different proportion. The effect on water/powder ratio, and surface hardness was determined. Material and method: Both material stone and die stone were blended with two proportion of additives so that each material was mixed twice but with different proportion of gum Arabic (0.1% and 0.2%) and calcium hydroxide (0.5 % and 0.3%). Data for hardness were subjected to two-way analysis of variance. Results: The results revealed that the chemical additi
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThrough the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in t
... Show MoreOptimization of gas lift plays a substantial role in production and maximizing the net present value of the investment of oil field projects. However, the application of the optimization techniques in gas lift project is so complex because many decision variables, objective functions and constraints are involved in the gas lift optimization problem. In addition, many computational ways; traditional and modern, have been employed to optimize gas lift processes. This research aims to present the developing of the optimization techniques applied in the gas lift. Accordingly, the research classifies the applied optimization techniques, and it presents the limitations and the range of applications of each one to get an acceptable level of accura
... Show MoreOptimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementati
... Show More