Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaotic system for a lightweight cryptographic algorithm. The proposed new chaotic system considers as super chaos. The NIST suite of all 15th tests is examined the proposed algorithm and showed high randomness and complexity.
This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen
... Show MoreNew N2O2 donor kind Schiff basehas been destined and structured by reaction Ampyrone with O-hydroxyacetophenone and Anthranilic acid. The metal complexes of the Schiff base with Mn(II), Hg(II), Ni(II), Cu(II), and Co(II) metal ions were designed and characterized by magnetic susceptibility, elemental analyses, molar conduction, IR, and 1H NMR,UV-Vis spectral metrics.The UV-Vis. and magnetic susceptibility data of the complexes suggest a square-planar, tetrahedraland octahedral geometries around the central metal ions. All elaborations were accomplished after determination the optimum molar concentration and pH which followed law of Lambert-Beer's in the researches pH scopes. The composition of these complexes were conclude dapprobating to t
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MorePoly vinyl alcohol has been studied for its ability to form crystallites by using annealing method. Semicrystalline films of poly vinyl alcohol (PVA) were prepared by casting 11.5 wt. % and 13 wt. % PVA aqueous solution onto glass slides at annealing temperature range 90 -120°C and duration time 15- 60 minute. This allowed the macromolecules to form crystallites, small regions of folded and compacted chains separated by amorphous regions where single PVA chain may pass through several of these crystallites. Degree of crystallinity of PVA films (hydrogels) was determined by method of density; on the other hand the swelling behavior was conducted by the determination of water uptake, wet degree of crystallinity, gel fraction and solubilit
... Show MoreThis study included collecting of 150 specimens of the Iraqi Bird Bulbule Pycnonotus lecuotis mesoptamiae (Pycnotidae , Passeriformes), from the 1st of November 2004 to 30th of October 2005 in the city of Baghdad and its suburbs, in concern of identifying the internal parasite of the digestive tract of these birds and studying the diseases resulted from the infection. The study showed that the bird Bulbule is Parasitized by Four types of Cestodes ,two of them are recorded in this kind of bird in Iraq for the first time ,Paradicranotinae anormalis and Haploparaxis sp. , and the other two are Raillietina tetragona and Allohymenolepsis sp. ,and by two types of Pin Worm(Trematode) that are identified for the first time in the Bird Bulb
... Show MoreThe food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu
... Show MoreIn recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MorePolyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests
... Show MoreAspect categorisation and its utmost importance in the eld of Aspectbased Sentiment Analysis (ABSA) has encouraged researchers to improve topic model performance for modelling the aspects into categories. In general, a majority of its current methods implement parametric models requiring a pre-determined number of topics beforehand. However, this is not e ciently undertaken with unannotated text data as they lack any class label. Therefore, the current work presented a novel non-parametric model drawing a number of topics based on the semantic association present between opinion-targets (i.e., aspects) and their respective expressed sentiments. The model incorporated the Semantic Association Rules (SAR) into the Hierarchical Dirichlet Proce
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More