Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce a pseudo-random number.
It is no secret to anyone the lofty classifications and wonderful investigations made by Muslim scholars in various eras, with which they removed the dust of ignorance from the nation, clarified the argument, and illuminated the path of education, especially in the legal sciences, which are the foundation of religion.
It is the life of hearts and the path of grammarians in this world and the hereafter.
Among those scientific classifications are the investigations they have written in the science of the principles of legislation, which have established the general evidence and the original rules to which practical legal rulings are referred. And as you know, it is the basis of Islamic jurisprudence, a means of knowing its
... Show MoreTransference numbers of the aqueous zinc chloride and zinc sulphate solutions have been measured for the concentrations 0.03, 0.05, 0.07, 0.09 and 0.1 mol.dm-3at 298.15K, by using the modified Hittorf method. The dependence of transference number on concentration of each electrolyte was also investigated in an attempt to explain the value of the limiting transference number. The Longsworth method has been used for the extrapolation of zinc transference number in aqueous solutions, using the values of the limiting transference numbers of the appropriate values of the limiting equivalent conductance, it was possible to determine the corresponding values of the limiting ion conductance for the cations and anions of the electrolytes. The
... Show MoreThe toxic lead additives to gasoline are no longer used in many countries around the world. Many other countries are now phasing out the lead in gasoline. Although the lead fuel is still in use in Iraq, several plans are considered to phase out the lead. The use of organic compounds to replace the lead additives in gasoline is considered now as an option in Iraqi refineries. The main objective of this project was preparation of premium gasoline, by blending of gasoline with Alternative additives (alcohol, aromatic) to enhancing octane number of Al-Doura gasoline pool. Improved gasoline was tested by ASTM standard method which includes octane number measuring by CFR engine analyzer. Gasoline pool RON (80) was used and selective components
... Show MoreThis article introduces a numerical study on heat exchange and corrosion coefficients of Zinc–water nanofluid stream in a circular tube fitted with swirl generator utilizing CFD emulation. Different forms of swirl generator which have the following properties of plain twisted tape (PTT) and baffle wings twisted tape (BTT) embeds with various ratio of twisting (y = 2.93, 3.91 and 4.89), baffle inclination angles (β = 0°, - 30° and 30) joined with 1%, 1.5% and 2% volume fraction of ZnO nanofluid were utilized for simulation. The results demonstrated that the heat and friction coefficients conducted by these two forms of vortex generator raised with Reynolds number, twist ratio and baffle inclination angles decreases. Likewise, t
... Show MoreThe Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for
... Show MoreThe study aims to find out the extent to which several Iraqi institutional accreditation standards (governance and administration, scientific research, curricula) are applied in two public universities (Baghdad and Middle Technical University) and two private universities (Uruk and Al-Mansour College) by diagnosing strengths and weaknesses and proposing a mechanism and procedures to help educational institution aims to reduce or eliminate the gap. The study stems from the extent of application of several Iraqi institutional accreditation standards represented as it was worked on through observation and field coexistence to reach scientific and practical facts. The method of case study and comparison betwe
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LT
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show More