In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream.
The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MoreReinforced concrete barriers have been commonly used in protecting the important building because the response of R.C. barriers subjected to blast loading is practically more acceptable than other materials used to build the barriers. In this study, the response of R.C. barriers was detected due to the blast effects caused by two charge weights (50 kg and 400 kg); ANSYS 14 was used to simulate the problem. A horizontal distance of 2 m between the explosive TNT charge and the front face of wall was taken. The pressure on the front face of the concrete barriers was measured at three levels. The R.C. barrier was entirely damaged when subjected to the blast effects caused by 400 kg TNT explosion bomb. However, the 50 kg TNT charge had
... Show MoreAbstract. Froth flotation is a solid-liquid separation technique that uses hydrophobicity as a driving force. Bacteria and other drinking water microorganisms tend to be hydrophobic and can be removed from water using this application. The biggest limitation against using froth flotation in the drinking water industry is the difficulty of producing froth without chemical frothers and holding bacteria in this froth without chemical collectors which deteriorate water taste and odor. Recently, researchers at the University of Sheffield described a method for producing froth using only water and compressed air. This has enabled froth flotation to be studied as an alternative to biocides for the removal of bacteria from drinking water. T
... Show MoreBackground: Nanoparticles are clusters of atoms in a size range from (1-100) nm. Nano dentistry creates amazing useful structures from individual atoms or molecules (nanoparticles), which provides a new alternative and a possibly superior strategy in prevention and treatment of dental caries through management of dental plaque biofilms. The aim of the study was to test the sensitivity of Streptococcus mutans to different concentrations of hydroxyapatite and iron oxide nanoparticles suspension solutions, in comparison to chlorhexidine, and de-ionized water, in vitro. Materials and methods: Agar well technique was applied to test the sensitivity of Streptococcus mutans to different concentrations of hydroxyapatite and iron oxide nanoparticle
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show More