Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreThe diseases presence in various species of fruits are the crucial parameter of economic composition and degradation of the cultivation industry around the world. The proposed pear fruit disease identification neural network (PFDINN) frame-work to identify three types of pear diseases was presented in this work. The major phases of the presented frame-work were as the following: (1) the infected area in the pear fruit was detected by using the algorithm of K-means clustering. (2) hybrid statistical features were computed over the segmented pear image and combined to form one descriptor. (3) Feed forward neural network (FFNN), which depends on three learning algorithms of back propagation (BP) training, namely Sca
... Show MoreAl-Qudis power plant was chosen, as one of the power stations of Baghdad, to investigate the effects of Cadmium that emitted from combustion of crude oil in that power plant on the workers' glutathione serum level. Air samples were taken seasonally during August 2011- July 2012 from four sites at Al- Qudis power plant which are oil treatment unit 1(site 1), oil treatment 2 (site2), pre –chimney 1(site 3) and pre-chimney 2 (site 4), to measure levels of heavy metal (cadmium) under study. Blood samples were collected from the workers to estimate the heavy metal Cadmium. Air cadmium levels during summer (August and September) were varied from 6.26 ± 0.6 μg/m3 at site 1 to 6.89 ± 0.67 μg/m3 at site 3, while in spring (end of March, and
... Show MoreAl-Qudis power plant was chosen, as one of the power stations of Baghdad, to investigate the effects of Cadmium that emitted from combustion of crude oil in that power plant on the workers' glutathione serum level. Air samples were taken seasonally during August 2011- July 2012 from four sites at Al- Qudis power plant which are oil treatment unit 1(site 1), oil treatment 2 (site2), pre –chimney 1(site 3) and pre-chimney 2 (site 4), to measure levels of heavy metal (cadmium) under study. Blood samples were collected from the workers to estimate the heavy metal Cadmium. Air cadmium levels during summer (August and September) were varied from 6.26 ± 0.6 μg/m3 at site 1 to 6.89 ± 0.67 μg/m3 at site 3, while in spring (end of March, and
... Show MoreThe mass collision energy loss (dE/dX), the mass radiative energy loss (Srad/) and the total mass stopping power of electrons in the energy range of 0.01 MeV up to 1000 MeV has been calculated for Lung, Urea and Skin. The results of the present work for the mass collision stopping power of electrons in Lung, Urea and Skin are in excellent agreement with the standard results given by ESTAR program, where the maximum percentage error between the present calculated values and that of ESTAR program in Lung tissue, Urea and Skin tissue is 0.27%, 0.3% and 0.8% respectively. The mass radiative energy loss of electrons in the same energy range is also calculated using a modified equation, and the results are found to be in very good agreem
... Show MoreA field experiment was carried out during the 2020 season at the College of Agricultural Engineering/ University of Baghdad, Al-Jadriya to evaluate the effect of dry farming when applying water stress under the subsurface drip irrigation system on water productivity and rice yield. The experiment was conducted with three levels of irrigation water stress when 10, 20 and 40% of the available water was depleted and in three dimensions between drip lines 10, 15 and 20 cm. The experiment was designed according to a randomized complete block design, according to the split plot design, with three replications. Determine the depth of irrigation water depending on the moisture depletion of th