Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our extensive studies indicated that our proposed encrypt and decrypt method provides increased security against hackers.
Sloped solar chimney system is a solar chimney power plant with a sloped collector. Practically, the sloped collector can function as a chimney, then the chimney height can be reduced and the construction cost would be reduced.The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady, turbulent standard model with Boussiuesq approximation to develop for the sloped solar chimney system in this study and evaluate the performance of solar chimney power plant in Baghdad city of Iraq numerically by Fluent (14) software with orking conditions such as solar radiation intensity (30
... Show MoreBiomedical signal such as ECG is extremely important in the diagnosis of patients and is commonly recorded with a noise. Many different kinds of noise exist in biomedical environment such as Power Line Interference Noise (PLIN). Adaptive filtering is selected to contend with these defects, the adaptive filters can adjust the filter coefficient with the given filter order. The objectives of this paper are: first an application of the Least Mean Square (LMS) algorithm, Second is an application of the Recursive Least Square (RLS) algorithm to remove the PLIN. The LMS and RLS algorithms of the adaptive filter were proposed to adapt the filter order and the filter coefficients simultaneously, the performance of existing LMS
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreColorectal cancer (CRC) is the most common gastrointestinal malignancy and one of the top ten common cancers worldwide with approximately 2 million cases. There are multiple risk factors that could lead to CRC emergence; of which are genetic polymorphisms. Excision repair cross-complementing group 2 (ERCC2) gene encodes for ERCC2 enzyme which plays a crucial role in maintaining genomic integrity by removing DNA adducts. Several studies suggested that there could be a link between genetic polymorphisms of ERCC2 gene and the risk of CRC development. Hence the present study aims to validate the relationship between the following ERCC2 single nucleotide polymorphisms (rs13181, rs149943175, rs530662943, and rs1799790) and CRC susceptibility. A t
... Show MoreThis study is included the preparation of two tetradentate amide-thiol proligands of the general structure [H2Ln], [where; (n = (1–2)]. The ligands [H2L1] and [H2L2] have been prepared from the reaction of the cyclic thioester 2-oxo-1, 4-dithiacyclohexane (compound 1) and 3-chloro-2-oxo-1, 4 dithiacyclohexane (compound 2) with 2-aminomethanepyridine in (1:1) ratio respetively. The reaction was carried out in chloroform at room temperature and under N2 atmosphere. Structural formula of these two ligands have been reported.