
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreMicrobial fuel cell is a device that uses the microorganism metabolism for the production of electricity under specific operating conditions. Double chamber microbial fuel cell was tested for the use of two cheap electrode materials copper and aluminum for the production of electricity under different operating conditions. The investigated conditions were concentration of microorganism (yeast) (0.5- 2 g/l), solutions temperature (33-45 oC) and concentration of glucose as a substrate (1.5- 6 g/l). The results demonstrated that copper electrode exhibit good performance while the performance of aluminum is poor. The electricity is generated with and without the addition of substrate. Addition of glucose substrate
... Show MoreThyroid hormones (TH) regulate the metabolic processes required for normal development and growth; also, to organizemetabolism in adults, any defect in thyroid function leads to abnormality in thyroid hormones level. The current study hasbeen designed to find the relationship between retinol-binding protein-4 and progranulin in the serum of Iraqi women withhypothyroidism and hyperthyroidism, also, to study whether these patients are exposed to a risk of developing diabetes mellitus,and PGRN may be a biomarker in detection early stage of diabetes mellitus.Materials and Methods: in this study, serum samples were obtained from 50 Iraqis women patients, [25 patients withhypothyroidism (G2) and 25 patients with hyperthyroidism (G3)] in addition
... Show MorePurpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More