In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. The dual encryption process achieves high diffusion and confusion properties for the cipher process. The second approach proposed a chaotic Arnold map before the Tiny Encryption Algorithm (TEA) process. Various statistical measures are used, such as Peak Signal to Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Image Quality Index (IQI). For example, the lower PSNR, SSIM, and IQI values indicate better results for test image Lina of the second approach. The obtained results for the previous measures of the second approach are 8.5449, 0.0008, and -0.0061, compared to the first approach, 8.5529, 0.0054, -0.0015, respectively. Moreover, key space and time analysis are used to assess the encryption process. The outcomes show a high-key space 32,768*2128 ) and a slight encryption time of 130 milliseconds for the first approach and 1862 milliseconds for the second approach.
Adsorption of lead ions from wastewater by native agricultural waste, precisely tea waste. After the activation and carbonization of tea waste, there was a substantial improvement in surface area and other physical characteristics which include density, bulk density, and porosity. FTIR analysis indicates that the functional groups in tea waste adsorbent are aromatic and carboxylic. It can be concluded that the tea waste could be a good sorbent for the removal of Lead ions from wastewater. Different dosages of the adsorbents were used in the batch studies. A random series of experiments indicated a removal degree efficiency of lead reaching (95 %) at 5 ppm optimum concentration, with adsorbents R2 =97.75% for tea. Three mo
... Show MoreAbstract. Geographical and remote sensing, which gave a picture of the change in the area of agricultural land in the study area for selected years (1980, 1990, 2000, 2010, 2020). In particular and Iraq in general, as this led to a reduction in the areas of agricultural lands and in return an increase in arid lands and their desertifica- tion and the loss of their productive value, which as a result leads to the migration of the population, the change of land sex, the failure to achieve food security and dependence on the import of the food basket.
This study proposes a hybrid predictive maintenance framework that integrates the Kolmogorov-Arnold Network (KAN) with Short-Time Fourier Transform (STFT) for intelligent fault diagnosis in industrial rotating machinery. The method is designed to address challenges posed by non-linear and non-stationary vibration signals under varying operational conditions. Experimental validation using the FALEX multispecimen test bench demonstrated a high classification accuracy of 97.5%, outperforming traditional models such as SVM, Random Forest, and XGBoost. The approach maintained robust performance across dynamic load scenarios and noisy environments, with precision and recall exceeding 95%. Key contributions include a hardware-accelerated K
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreBlood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w
... Show MoreThis work describes the effect of temperature on the phase transformation of titanium dioxide (TiO2) prepared using metal organic precursors as starting materials. X-ray diffraction (XRD) was used to investigate the structural properties of TiO2 gels calcined at different temperatures (300, 500, 700) ?C. the results showed that the samples have typical peaks of TiO2 polycrystalline brookite nanopowders after calcined at (300 ?C), which confirmed by (111), (121), (200), (012), (131), (220), (040), (231), (132) and (232) diffraction peaks. Also, XRD diffraction spectra showed the presence of crystallites of anatase with low proportion of rutile phase where calcined at (500 ?C), while rutile phase domains at (700 ?C). The crystallite size of
... Show MoreAbstract
The issue of the protection of the environment is a shared responsibility between several destinations and sectors, and constitutes a main subject in which they can achieve sustainable development. In the sectors of government programs can be set up towards the establishment of the government sector to the green environment, so to be the implementati
... Show MoreGeographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf
... Show More