Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreUpper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin
... Show MoreRealistic implementation of nanofluids in subsurface projects including carbon geosequestration and enhanced oil recovery requires full understanding of nanoparticles (NPs) adsorption behaviour in the porous media. The physicochemical interactions between NPs and between the NP and the porous media grain surface control the adsorption behavior of NPs. This study investigates the reversible and irreversible adsorption of silica NPs onto oil-wet and water-wet carbonate surfaces at reservoir conditions. Each carbonate sample was treated with different concentrations of silica nanofluid to investigate NP adsorption in terms of nanoparticles initial size and hydrophobicity at different temperatures, and pressures. Aggregation behaviour and the
... Show MoreIt is well known that petroleum refineries are considered the largest generator of oily sludge which may cause serious threats to the environment if disposed of without treatment. Throughout the present research, it can be said that a hybrid process including ultrasonic treatment coupled with froth floatation has been shown as a green efficient treatment of oily sludge waste from the bottom of crude oil tanks in Al-Daura refinery and able to get high yield of base oil recovery which is 65% at the optimum operating conditions (treatment time = 30 min, ultrasonic wave amplitude = 60 micron, and (solvent: oily sludge) ratio = 4). Experimental results showed that 83% of the solvent used was recovered meanwhile the main water
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreBackground: Although expression of the HER-
2/neuoncogene may be of some prognostic importance
in advanced ovarian cancer, its role in early-stage
disease has not been established. The current study
examined the prevalence and significance of HER-
2/neu expression in different grades of different types
of surface epithelial ovarian carcinoma.
Methods: Thirty eight female patients with surface
epithelial ovarian cancer were included in this study.
The blocks of corresponding formalin fixed, paraffinembedded
ovarian biopsies were retrieved from the
archives and hematoxylin-eosin slides of each ovarian
biopsy were reviewed and marked their grades of
differentiation , then a new sections from each sampl
The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThe current study is descriptive; it focuses on studying the contemporary geopolitical problem, and sectarian differences in Caucasus. Nagorno-Karabakh is considered an important disputed region nowadays. Many parties and states participated in this dispute, especially after the conflict had developed into an open war between Armenia and Azerbaijan. Thus, the study aims to examine the causes of the conflict in this region, analyze the international positions on this conflict, and find if Armenia was able to occupy this region. The methodology adopted by the researchers is the functional approach, and the theory of power analysis that Cohen created for analyzing all strengths that drove each of the parties t
... Show More