Preferred Language
Articles
/
joe-1561
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun May 19 2024
Journal Name
Basrah Journal Of Agricultural Sciences
Investigation on Field Performance of Plowing and Harvesting Potatoes in Southern Baghdad
...Show More Authors

This field experiment, was conducted to investigate a comparison of two methods for harvesting potatoes: mechanical and handy when using moldboard and chisel plow for primary tillage and three different distances for planting tubers in the rows 15, 25, and 35 cm in silt clay loam soil south of Baghdad. The factorial experiment followed a randomized complete block design with three replications using L.S.D. 5 % and 1 %. Mechanical harvest recorded the best valid potato tubers at 88.78 %, marketable yield of 31.74 ton. ha-1, efficiency lifted 95.68 %, tubers damage index 28.41, speeding up the harvesting process and reducing time and effort. Handy harvest gave the least damage to potato tubers, 6.02 %, and unlifted potato tubers, 4.32 %. Howe

... Show More
Publication Date
Wed Jun 04 2025
Journal Name
Engineering, Technology & Applied Science Research
Investigating Fiber Reinforcement Effects on the Performance of Concrete Pavements under Repeated Load
...Show More Authors

Concrete pavements are essential to modern infrastructure, but their low tensile and flexural strengths can cause cracking and shrinkage. This study evaluates fiber reinforcement with steel and carbon fibers in various combinations to improve rigid pavement performance. Six concrete mixes were tested: a control mix with no fiber, a mix with 1% steel fiber (SF1%), a mix with 1% carbon fiber (CF1%), and three hybrid mixes with 1% fiber content: 0.75% steel /0.25% carbon fiber (SF0.75CF0.25), 0.25% steel /0.75% carbon fiber (SF0.25CF0.75), and 0.5% steel /0.5% carbon fiber ((SF0.5CF0.5). Laboratory experiments including compressive, flexural, and splitting tensile strength tests were conducted at 7, 28, and 90 days, while Finite Element Analys

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Improvement of Asphalt Concrete Mixtures by Adding Pulverised Fuel Ash as Filler
...Show More Authors

Consuming of by-product or waste materials in highway engineering is significant in the construction of new roads and/or in renovations of the existing ones. Pulverised Fuel ash (PFA), which is a by-product material of burning coal in power stations, is one of these materials that might be incorporated instead of mineral filler in hot asphalt mixtures.

Two types of surface course mixtures have been prepared one with conventional mineral filler i.e. ordinary Portland cement (OPC) while the second was with PFA. Several testings have been conducted to indicate the mechanical properties which were Marshall Stability and Indirect Tensile Strength tests. On the other hand, moisture damage and ageing have been evaluated

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Fuel
Matrix acidizing in carbonate rocks and the impact on geomechanical properties: A review
...Show More Authors

Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi

... Show More
View Publication
Scopus (23)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Thu Feb 13 2025
Journal Name
Technology In Agronomy
Challenges and innovations in potato harvester design: the role of artificial intelligence in improving crop sorting
...Show More Authors

As population growth increases the demand for crops increases and their quality improves, and it becomes necessary to find innovative and modern solutions to enhance production. In this context, artificial intelligence plays a pivotal role in developing new technologies to improve crop sorting and increase agricultural yields. The present review discusses the main differences between manual and mechanical potato harvesting, explaining the advantages and disadvantages of each method. Manual harvesting is highlighted as a traditional method that allows for greater precision in handling the crop, but it requires more time and effort. In contrast, mechanical harvesting provides greater efficiency and speed in the process, but it may damage some

... Show More
View Publication
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Tensile and Compressive Properties of Kaolin Rienforced Epoxy
...Show More Authors

Abstract

The toughening of epoxy resins with the addition of organic or inorganic compounds is of great interest nowadays, considering their large scale of applications. In the present work, composites of epoxy are synthesized with kaolin particles having different particle sizes as reinforcement. Composites of epoxy with varying concentration (0 to 40 weight %) of kaolin was prepared by using hand lay method. The variation of mechanical properties such as modulus of elasticity, yield, tensile, and compressive strength with filler content was evaluated. The composite showed improved modulus of elasticity and compressive properties on addition of filler. In contrast, the tensile and yield strength of the composite

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Recycling waste papers in green cement mortars
...Show More Authors

This work investigates the utilization of waste papers (natural and industrial) i.e (citrus aurantium and papers A4) mortars containing specified contents 0.5%, 1%, 1.5% of waste papers were prepared and cured. Mechanical characteristics such as compressive and bending strengths, hardness and water absorption were determined for the mortars mixed with the waste papers and compared with those obtained from the pure mortars. Results showed that the addition of waste paper leads to increase the hardness to (69 - 68.5) shore D for (natural and industrial) wastes materials respectively comparing with pure specimen 66 shore D. The compressed strength of the mortar cement specimen cured for 28 days from 13 MPa to (17-18) MPa for (natural and in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref