The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreMost researchers concentrate their studies on the design, stress and pressure distributions of the prosthetic socket. A little attention is considered for the stiffness of the various materials of the prosthetic sockets. Prosthetic laminated sockets in Iraq are costly to be manufactured while polypropylene socket is relatively cheap in comparing with the laminates.
Experimental study is conducted to compare the stiffness of five prosthetic sockets made of different materials. Compression, three point flexural and tensile tests are implemented by the Testometric machine. The laminate sockets give better results in compression than polypropylene. Polypropylene gives good results in bending compared with the laminate sockets. When t
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreIn the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreResearch Objectives: The research aims to highlight the approach of Imam Al-Qaradawi in contemporary jurisprudence in the recent issues of the jurisprudence of minorities, and mentioning the foundations of jurisprudence of minorities, along with some of the practical applications of Imam Al-Qaradawi.
Study Methodology: The researcher applied the inductive, analytical and comparative approach by tracking the scientific material related to the subject of the study from the books of Al-Qaradawi in the first place, then by comparing the legal provisions with what had been stated in the four schools of jurisprudence.
Findings: The interest and need of Muslim minorities in non-
... Show MoreThis work intends to develop an effective heavy metal-free modifier having properties comparable to traditional stabilizers and flame retardants, simultaneously being environmentally friendly and may be superior in many aspects. The important requirement focused on is: how to increase thermal stability and flame retardancy of flexible poly(vinyl chloride). Due to the typical materials now used with poly(vinyl chloride), which increases health and environmental concerns, utilizing a novel heavy metal-free additive will make poly(vinyl chloride) substantially safer. We have used an artificial silicate for this aim, which proved to be an efficient flame retardant and surprisingly showed excellent heat stabilizing effect. Thermal stabi
... Show More