Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe precise classification of DNA sequences is pivotal in genomics, holding significant implications for personalized medicine. The stakes are particularly high when classifying key genetic markers such as BRAC, related to breast cancer susceptibility; BRAF, associated with various malignancies; and KRAS, a recognized oncogene. Conventional machine learning techniques often necessitate intricate feature engineering and may not capture the full spectrum of sequence dependencies. To ameliorate these limitations, this study employs an adapted UNet architecture, originally designed for biomedical image segmentation, to classify DNA sequences.The attention mechanism was also tested LONG WITH u-Net architecture to precisely classify DNA sequences
... Show MoreAlteration of repeat tract length within the SSR of phase variable genes may enhance the persistence of isolates within their host for a long time (a period of months) (Alamro et al.,2014). Alamro et al. (2014) showed there was trend towards selection for OFF state or low expression for five phase variable genes (opc, hmbr, nadA, nalP, hpuAB) in three carriers (V54, V124 and V64) within strains belonging into CC174 and CC167 in first, second and third time points. He concluded that the selection for low or OFF state helped N. meningitidis to persist for a long time (Alamro et al., 2014). The current study aimed to detect the alteration in the repeat tracts of the same five variable genes within the previous three carriers (V54, V124, and V6
... Show MoreThe Turonian-Lower Companian succession at Majnoon Oil Field is represented by the Khasib, Tanuma, and Saadi formations. Four major paleoenvironments were recognized within the studied succession, there are: Shallow open marine environment, shoal environment, deep marine environment, and basinal environment. They reflect deposition on a carbonate platform of homoclinal ramp setting. The studied succession represents two second order supersequences (A) and (B). Supersequence (A) includes both the Khasib and Tanuma formations. The Saadi Formation represents cycle (B). These second order cycles can be divided each into two third order cycles, This subdivision may reflect the effect of eustacy being the major controlling factor of cycles dev
... Show MoreThis research is a case study to solve control problems in Al Rasheed edible oil factory fire tube boilers. they have hopes to develop a new control system to manage boilers operation. The suggestion is to use Zelio soft programmable relays instead of the unavailable old control units. Operation philosophy was studied through works of literature, operation manuals, and standards. Programmable logic control relay is proposed as an advanced selection than PLC's. Boilers operation is accompanied by operation risks. many boilers were exploded in Iraq for different reasons. Some problems are attributed to manual operation mistakes. Extensive work was done to understand the operation sequence, emergency shutdown, and faults causing the trips. A c
... Show MoreIn this paper, we propose a method using continuous wavelets to study the multivariate fractional Brownian motion through the deviations of the transformed random process to find an efficient estimate of Hurst exponent using eigenvalue regression of the covariance matrix. The results of simulations experiments shown that the performance of the proposed estimator was efficient in bias but the variance get increase as signal change from short to long memory the MASE increase relatively. The estimation process was made by calculating the eigenvalues for the variance-covariance matrix of Meyer’s continuous wavelet details coefficients.
In this paper, we propose a method using continuous wavelets to study the multivariate fractional Brownian motion through the deviations of the transformed random process to find an efficient estimate of Hurst exponent using eigenvalue regression of the covariance matrix. The results of simulations experiments shown that the performance of the proposed estimator was efficient in bias but the variance get increase as signal change from short to long memory the MASE increase relatively. The estimation process was made by calculating the eigenvalues for the variance-covariance matrix of Meyer’s continuous wavelet details coefficients.
NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among
This work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic
... Show More