The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
Activated carbon (AC) is a highly important adsorbent material, as it is a solid form of pure carbon that boasts a porous structure and a large surface area, making it effective for capturing pollutants. Thanks to its exceptional features, AC is widely used for purifying water that is contaminated with odors and removing dyes in a cost-effective manner. A variety of carbonic materials have been employed to prepare AC, and this study aimed to evaluate the suitability of utilizing waste mango and avocado seeds for this purpose, followed by testing their efficacy in removing dye from aqueous solutions. The results indicate that using waste mango and avocado as AC is technically feasible, achieving dye removal percentages of 98% and 93%,
... Show MoreThe modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThe present study focuses on the deformation of neutron-rich nuclei near the neutron drip line. The nuclei of interest include 28O, 42Si, 58Ca, 80Ni, 100Kr, 122Ru, 152Ba, 166Sm, and 176Er. The relativistic Hartree - Bogoliubov (RHB) approach with effective density-dependent point coupling is utilized to investigate the triaxial deformation, and Skyrme - Hartree - Fock + Bardeen - Cooper - Schrieffer is used to analyze the axial deformation. The study aimed to understand the interplay between nuclear forces, particle interactions, and shell structure to gain insights into the unique behavior of neutron-rich nuclei. Despite these nuclei containing magic numbers, their shapes are still affected by the nucleons' collective behavior and
... Show MoreDiacerein (DCN) is a semi-synthetic anthraquinone derivative of Rhein that is indicated for the management of osteoarthritis. Diacerein exhibits poor dissolution in the GIT fluids and suffers from low bioavailability upon oral administration in addition to the laxative effect of Rhein metabolites. The aim of the present study was to develop novasomal vesicles with optimized entrapment efficiency and size to serve as a carrier for transdermal delivery of diacerein. Novasomal vesicles were prepared by thin film hydration method thin film hydration. The prepared vesicles were optimized utilizing different surfactant to cholesterol molar ration, sonication type, different sonication times and varying fatty acid level. The prepared vesicles were
... Show MoreFlexible pavements are considered an essential element of transportation infrastructure. So, evaluations of flexible pavement performance are necessary for the proper management of transportation infrastructure. Pavement condition index (PCI) and international roughness index (IRI) are common indices applied to evaluate pavement surface conditions. However, the pavement condition surveys to calculate PCI are costly and time-consuming as compared to IRI. This article focuses on developing regression models that predict PCI from IRI. Eighty-three flexible pavement sections, with section length equal to 250 m, were selected in Al-Diwaniyah, Iraq, to develop PCI-IRI relationships. In terms of the quantity and severity of eac
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreA modified chemical method was used to prepare titanium dioxide nanoparticles (TiO2 NPs), which were diagnosed by several techniques: X-ray diffraction, Fourier transform infrared, field emission scaning electron microscopy, energy disperse X-ray, and UV-visible spectroscopy, which proved the success of the preparation process at the nanoscale level. Where the titanium oxide particles have an average particle size equal to 6.8 nm, titanium dioxide particles were used in the process of adsorption of Congo red dye from its aqueous solutions using a batch system. The titanium oxide particles gave an adsorption efficiency of Congo red dye up to more than 79 %. The experimental data of the adsorption process were analyzed with kinetic models and
... Show More