This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling.
Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreSlag of aluminum is a residue which results during the melting process of primary and secondary aluminum production. Salt slag of aluminum is hazardous solid waste according to the European Catalogue for Hazardous Wastes. Hence, recovery of aluminum not only saves the environment, but also has advantages of financial and economic returns. In this research, aluminum was recovered and purified from the industrial wastes generated as waste from both of State Company for Electrical and Electronic Industries (Baghdad/AlWaziriya) and General Company for Mechanical Industries (Babylon/-Al-Escandria). It was found that these wastes contain tiny proportions of other elements such as iron, copper, nickel, titanium, lead, and potassium. Wastes were
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThis work investigates the utilization of waste papers (natural and industrial) i.e (citrus aurantium and papers A4) mortars containing specified contents 0.5%, 1%, 1.5% of waste papers were prepared and cured. Mechanical characteristics such as compressive and bending strengths, hardness and water absorption were determined for the mortars mixed with the waste papers and compared with those obtained from the pure mortars. Results showed that the addition of waste paper leads to increase the hardness to (69 - 68.5) shore D for (natural and industrial) wastes materials respectively comparing with pure specimen 66 shore D. The compressed strength of the mortar cement specimen cured for 28 days from 13 MPa to (17-18) MPa for (natural and in
... Show MoreAbstract
The toughening of epoxy resins with the addition of organic or inorganic compounds is of great interest nowadays, considering their large scale of applications. In the present work, composites of epoxy are synthesized with kaolin particles having different particle sizes as reinforcement. Composites of epoxy with varying concentration (0 to 40 weight %) of kaolin was prepared by using hand lay method. The variation of mechanical properties such as modulus of elasticity, yield, tensile, and compressive strength with filler content was evaluated. The composite showed improved modulus of elasticity and compressive properties on addition of filler. In contrast, the tensile and yield strength of the composite
... Show MoreConsuming of by-product or waste materials in highway engineering is significant in the construction of new roads and/or in renovations of the existing ones. Pulverised Fuel ash (PFA), which is a by-product material of burning coal in power stations, is one of these materials that might be incorporated instead of mineral filler in hot asphalt mixtures.
Two types of surface course mixtures have been prepared one with conventional mineral filler i.e. ordinary Portland cement (OPC) while the second was with PFA. Several testings have been conducted to indicate the mechanical properties which were Marshall Stability and Indirect Tensile Strength tests. On the other hand, moisture damage and ageing have been evaluated
... Show MoreAs population growth increases the demand for crops increases and their quality improves, and it becomes necessary to find innovative and modern solutions to enhance production. In this context, artificial intelligence plays a pivotal role in developing new technologies to improve crop sorting and increase agricultural yields. The present review discusses the main differences between manual and mechanical potato harvesting, explaining the advantages and disadvantages of each method. Manual harvesting is highlighted as a traditional method that allows for greater precision in handling the crop, but it requires more time and effort. In contrast, mechanical harvesting provides greater efficiency and speed in the process, but it may damage some
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show More