In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream.
Regression testing is a crucial phase in the software development lifecycle that makes sure that new changes/updates in the software system don’t introduce defects or don’t affect adversely the existing functionalities. However, as the software systems grow in complexity, the number of test cases in regression suite can become large which results into more testing time and resource consumption. In addition, the presence of redundant and faulty test cases may affect the efficiency of the regression testing process. Therefore, this paper presents a new Hybrid Framework to Exclude Similar & Faulty Test Cases in Regression Testing (ETCPM) that utilizes automated code analysis techniques and historical test execution data to
... Show MoreObjective: This research aimed to study the relation between maximal bite force (MBF) and maximum mouth opening among 12-year-old school children. Methods: In this cross-sectional study, a total of 400 children aged 12 years (194 boys and 206 girls) were examined. The MBF for the right and left side, as well as the anterior region, were evaluated for all children. The MMO was measured using an electronic digital caliper. To analyze the data path analysis method was used. Results: Boys showed a higher MMO of 48.797 ± 6.500 than girls (46.710 ± 5.926 mm). The MMO increased with increasing MBF, with significant differences between females and males. Conclusion: The MMO was higher in boys than in girls. Gender plays a significant ro
... Show MoreThe current Iraqi standard specifications for roads and bridges allowed the prepared Job-Mix Formula for asphalt mixtures to witness some tolerances with regard to the following: coarse aggregate gradation by ± 6.0 %, fine aggregate gradation by ± 4.0 %, filler gradation by ± 2.0 %, asphalt cement content by ± 0.3 % and mixing temperature by ± 15 oC. The objective of this work is to evaluate the behavior of asphalt mixtures prepared by different aggregates gradations (12.5 mm nominal maximum size) that fabricated by several asphalt contents (40-50 grade) and various mixing temperature. All the tolerances specified in the specifications are taken into account, furthermore, the zones beyond these tolerances
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreAfter the year 2003, Iraq went through multiple waves of violence and at different levels on the security, intellectual, political and social levels. Behind that stood several motives and incentives to enable violence that represented the first axis of research, the most important of which was the political motives that circulated an atmosphere that politics against society and transformed power into a field of political brutality against the individual and the group at once. There are also cultural, intellectual, media and economic motives such as weak cultural independence, poverty, marginalization, unemployment and want, and the absence of a media discourse that rejects violence but incites it, on the other ha
... Show More
The most prominant goal aimed at by contemporary islamic ideology is to present Islam to the whole world as a message of God that establishes for man a supreme civilization to accomplish justice, peace, development and prosperity
This mission is hindered by many obstacles that create Islamic ideology crisis such as loss of Comprehensive unifying vision which led to the loss of correct vision. This resulted in a Weakness of Priority arrangement and national interests a accomplishment.
There is also a problem of the curriculum that teaches Islamic ideology .
Another problem is that of the concept taken from Islamic culture.
Also another Problem Is the lack of understanding of
... Show MoreIn this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
