Chacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This paper proposes an improvement of chaha20 stream cypher algorithm based on tent and Chebyshev functions (IChacha20). The main objectives of the proposed IChacha20 algorithm are increasing security layer, designing a robust structure of the IChacha20 to be enabled to resist various types of attacks, implementing the proposed algorithm for encryption of colour images, and transiting it in a secure manner. The test results proved that the MSE, PSNR, UQI and NCC metrics of IChacha20 are better than those of the original Chacha20. Also, the proposed method has a faster execution time (01:26:4 sec) compared with the original algorithm (02:07:1 sec).
The Paleocene-Eocene Thermal Maximum (PETM) event, which represented a sudden and abnormal rise in temperature during the early Cenozoic Era, is regarded as one of the most important global geologic phenomena. Two important index microfossils (nannoplankton and Ostracoda) were utilised to understand and predict the paleoenvironment and describe the changes during this period. The basis of the study was 12 cutting samples taken from Aaliji and the lower part of Jaddala formations of a subsurface section of (Ba-8) borehole in central Iraq. Some geophysical data were used to determine the upper and lower contacts of the Aaliji Formation and define the shale rate in the studied formations. The micropaleontologic investigation reveals
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreSmishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show MoreThe budget represents a critical accounting tool used for planning and control. It is considered a measure of the results expected to occur.
This study aims to identify the impact of the Kaizen Budget in reducing costs and continuous improvement on the General Company's operations for Light Industries. The research idea is based on the fact that preparing the budget based on constant improvement supports the higher management of people, processes, materials, and production methods, thus enabling them to manage and reduce their costs.
Research results that the prepared budget suffers from many shortages that limit the materials' usefulness for management
This study was aimed to evaluate the effect of spraying nano chitosan loaded with NPK fertilizer and nettle leaf and green tea extracts on the growth and productivity of potato for the spring and fall seasons of 2021.It was conducted at private farm in Wasit Governorate, Iraq, as a factorial experiment (5 × 5) within randomized complete block design using three replicates. The first factor included spraying with four concentrations of chitosan nanoparticles loaded with NPK fertilizer 0, 10. 15 and 20% in addition to chemical fertilization treatment, the second factor was spraying nettle leaf extract 25 and 35 gL-1 and green tea extract with 2 and 4 g.L-1, in addition to the control treatment, spraying with distilled water only. The
... Show MoreA calamitic symmetric liquid crystalline consisting of an azo group containing 5H-Thiazolo[3,4-b][1,3,4]thiadiazole moiety compound[III] was synthesized via sequence reactions starting from reaction terephthaldehyde with mercaptoacetic acid and thiosemicarbazide in the presence of concentrated sulfuric acid to synthesized 5,5'-(1,4-phenylene)bis(5Hthiazolo[4,3-b][1,3,4]thiadiazol-2-amine)[I] then the azo compound [II] synthesized by coupling between diazonium salt of the compound [I] with phenol at (0-4) ̊C., after that the compound [III] was synthesized by the reaction of the compound [II] with methyl bromide in alkaline media. The compounds are characterized by melting points, FTIR and 1HNMR spectroscopy. The mesomorphic behavior was stu
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More