A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statistical tests of the generated sequence of bits are investigated by applying five evaluations as well as the ACF and NIST. The results of five standard tests of randomness have been illustrated and overcome a value of 0.160 in frequency test. While the run test presents the pass value t0=4.769 and t1=2.929. Likewise, poker test and serial test the outcomes was passed with 3.520 for poker test, and 4.720 for serial test. Finally, autocorrelation test passed in all shift numbers from 1 to 10.
Nutrient agar medium with various concentrations of cefotaxime was used for isolation spontaneous mutants from wild type strain of P.aeruginosa PHA-1. Eighty-two mutants were successfully isolated with the viable count 52×107 , these mutants were confirmed as spontaneous not physiological adaption mutants by reculture on the same medium. Then, wild type PHA-1 and mutants were examined for production pyocyanin; a blue greenish pigment was clearly noticed on King A medium. Remarkably the mutant strain named S300-8 was distinguished in productivity in comparison with wild type strain PHA-1; the amount of pigment was 56.0667mg/l and 74.53mg/l respectively. In addition, pyocyanin produced by mutant strain S300-8 revealed a potent efficacy again
... Show MoreBackground: Implant stability is a mandatory factor for dental implant (DI) osseointegration and long-term success. The aim of this study was to evaluate the effect of implant length, diameter, and recipient jaw on the pre- and post-functional loading stability. Materials and methods: This study included 17 healthy patients with an age range of 24-61 years. Twenty-two DI were inserted into healed extraction sockets to replace missing tooth/ teeth in premolar and molar regions in upper and lower jaws. Implant stability was measured for each implant and was recorded as implant stability quotient (ISQ) immediately (ISQ0), and at 8 (ISQ8) and 12 (ISQ12) weeks postoperatively, as well as post-functional loading (ISQPFL). The pattern of implant
... Show MoreThe study aimed to recognize the impact of polygamy on academic achievement and self-confidence among Sattam bin Abdul Aziz University students. To achieve this goal, the researchers used the Descriptive Analytical method using The Self Confidence measurement ,that has been prepared for the purposes of this study, consists set of 29 questions, then applied to the students sample that emerges from polygamy and one- wife families, study sample consists of randomly selected 230 students registered for the year .1435-1436
The results of the study showed presence of medium statistical impact on the significance level (a 4 0.05), this proof significant statistical effect of polygamy on self-confidence among the sample of Prince Sat-tam Univ
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreVitamin A, namely retinol is still the most proper agent for modulating so many biochemical reactions and biological functions in different tissues and organs. In addition to the provitamins A and α, βand γ-carotenoids that are present in various foods from either animal or plant origin, retinoids and rexinoids form the natural and synthetic analogs that are chemically related or unrelated and can be added as food supplements for deficiency disorders of vitamin A or used to alleviate or treat certain health problems such as skin carcinoma, acne, skin aging and dermatitis.
Cressa cretica (Shuwwayl) is a halophytic that belongs to Convolvulaceae, naturally grown in the Middle East including Iraq. Traditionally the plant is used as a paste for sore treatment, also it is used for fever, jaundice, and other illness. Regarding nonclinical use it is used as goat, sheep, and camel feed also as an oil source. Flavonoids including quercetin, kamepferol, apigenin, and their glycosides, phenolic acid as chlorogenic acid, and phytosterols mainly ?–sitosterol were the most important phytochemicals that were detected in this halophyte. Crude ethanolic, methanolic extracts and ethyl acetate fraction of the areal parts were used in clinical studies and demonstrated various effe
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio