In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream.
Drug consultation is an important part of pharmaceutical care. mobile phone call or text message can serve as an easy, effective, and implementable alternative to improving medication adherence and clinical outcomes by providing the information needed significantly for people with chronic illnesses like diabetes and hypertension particularly during pandemics like COVID-19 pandemic.
Several million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up t
... Show MoreThe religious forgiving in Islam takes its highest moral value from the law of Muslims (Holy Quran) that practically embodied through the biography of passenger Mohammad (pubh) and the caliphs who behave also according to prophet did to treat with non muslim who were a part of society those are Jewish ,
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreВ статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции в иракской аудитории с привлечением компьютерных технологий. Статья посвящена использованию мультимедийных технологий и различных приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн
... Show MoreThe problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
Objective:To measure the acceptance level of the Personal Digital Assistance (PDA)’suse among nursing students as a tool of education in the Kingdom of Saudi Arabia. Methodology: Eighty-nine nursing students participated in this cross-sectional descriptive study by completing a questionnaire based on the Technology Acceptance Model (TAM) by Davis. Two dimensions were explored and evaluated; (1) the applicability of the TAM model in assessing this technology; and (2) the overall percentage of students’ agreement on the different TAM variables. Results: This study presented significant positive influence bet
The purpose of this research is to identify the E-signing and its concept.
Due to the increasing role and importance of the E-trade in may countries, as it provide many advantages over the traditional trade. We have to deal with may E-trade aspects and tools in which the E-signing is the most important. In this research we will deal: first with the article approach- E-signing definition, Digital signing, its mechanism, requirements, types and features. Second: the practical approach: It has been implemented according to a questionnaire contain many questions some of them are comma, other an specialized in research hypothesis and some concern the obstacles faced the application of E-signing. The questionnaires been distillated to
... Show Moreاستخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي