Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
In this paper, certain types of regularity of topological spaces have been highlighted, which fall within the study of generalizations of separation axioms. One of the important axioms of separation is what is called regularity, and the spaces that have this property are not few, and the most important of these spaces are Euclidean spaces. Therefore, limiting this important concept to topology is within a narrow framework, which necessitates the use of generalized open sets to obtain more good characteristics and preserve the properties achieved in general topology. Perhaps the reader will realize through the research that our generalization preserved most of the characteristics, the most important of which is the hereditary property. Two t
... Show MoreAbstract
Heavy-duty diesel vehicle idling consumes fossil fuel and reduces atmospheric quality at idle period, but its restriction cannot simply be proscribed. A comprehensive tailpipe emissions database to describe idling impacts is not yet available. This paper presents a substantial data set that incorporates results from DI multi-cylinders Fiat diesel engine. Idle emissions of CO, hydrocarbon (HC), oxides of nitrogen (NOx), smoke opacity, carbon dioxide (CO2) and noise have been reported, when three EGR ratios (10, 20 and 30%) were added to suction manifold.
CO2 concentrations increased with increasing idle time and engine idle speed, but it didn’t show clear effect for IT adva
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreThe research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of
... Show MoreThis study has been carried out to evaluate the expression level of beta 2 microglobulin gene on patients infected by hepatitis C virus before and after treatment with interferon. The study included 117 hepatitis C patients comprising as 63 pre-treated patients, the range of age was between 20-65 year with a mean age of 48.12 ± 16.1 and 54 post-treated patients with age range was between 23-63 year with the mean of 46.1 ± 18.1. Also it was found that more than half of patients were located within third and fourth decade i.e. 30-49 year, with a percentage of 52.4% and 55.6 % for pre-treatment and post-treatment patients respectively. Moreover , regarding both groups, males are more than females with the ratio of ( 3.2:1) among p
... Show MoreResearch Summary :
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:
This is brief research that contained between its two covers one of the jurisprudence rules derived from Islamic Sharia that guarantees the right of others, in case of forcing to do the prohibited act, and it is a restriction of the rule: “Necessities allow prohibitions” and “Hardship brings facilitation” and support for the rule: “Necessities are valued.” It is an origin in alleviating the taxpayer definitely , and the study has briefly shown some of the jurisprudential appli
... Show MoreAbstract The present study aimed to investigate the morphological description and histological structure of thyroid gland in Herpestes javanicus . The results revealed that thyroid gland in adult Herpestes javanicus is located in the neck region just below the larynx and attached to the trachea . Histological study revealed that thyroid gland in H. javanicus surrounded by a capsule of losse connective tissue and the thyroid gland mainly formed from follicles within different sizes. The results showed that the follicle consists of three compenets represented by follicular lining cells, basal parafollicular cells and the colloid. Microscopical examination revealed that the follicular lining tissue is either to be simple squamous or simple cub
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreAbstract. Geographical and remote sensing, which gave a picture of the change in the area of agricultural land in the study area for selected years (1980, 1990, 2000, 2010, 2020). In particular and Iraq in general, as this led to a reduction in the areas of agricultural lands and in return an increase in arid lands and their desertifica- tion and the loss of their productive value, which as a result leads to the migration of the population, the change of land sex, the failure to achieve food security and dependence on the import of the food basket.