This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling.
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreAlmost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne
... Show MoreChanges in mechanical properties of material as a result of service in different conditions can be provided by mechanical testing to assist the estimation of current internal situation of these materials, or the degree of deterioration may exist in furnaces serviced at high temperature and exceed their design life. Because of the rarity works on austenitic stainless steel material type AISI 321H, in this work, ultimate tensile strength, yield strength, elongation, hardness, and absorbed energy by impact are evaluated based on experimental data obtained from mechanical testing. Samples of tubes are extracted from furnace belong to hydrotreaterunit, also samples from un-used tube material are used to make comparisons between these properti
... Show MoreFrequently, Load associated mode of failure (rutting and fatigue) as well as, occasionally, moisture damage in some sections poorly drained are the main failure types found in some of the newly constructed road within Baghdad as well as other cities in Iraq. The use of hydrated lime in pavement construction could be one of the possible steps taken in the direction of improving pavement performance and meeting the required standards. In this study, the mechanistic properties of asphalt concrete mixes modified with hydrated lime as a partial replacement of limestone dust mineral filler were evaluated. Seven replacement rates were used; 0,0.5, 1, 1.5, 2, 2.5 and 3 percent by weight of aggregate. Asphalt concrete mixes were prepared at their
... Show MoreZinc oxide thin films were deposited by chemical spray pyrolysis onto glass substrates which are held at a temperature of 673 K. Some structural, electrical, optical and gas sensing properties of films were studied. The resistance of ZnO thin film exhibits a change of magnitude as the ambient gas is cycled from air to oxygen and nitrogen dioxide
Recognition is one of the basic characteristics of human brain, and also for the living creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.
One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwrit
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More