A simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.
Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreThis research aims to knowledge the extent of the application of Tuz General Hospital to the concept of tacit knowledge dimensions (mental models, intuition, experience, skill) and methods of acquiring knowledge dimensions (training, job rotation, work teams) and the measurement and analysis of the link and the kind of impact between the methods of acquiring knowledge and tacit knowledge of the Angels nursing in the researched hospital, and was the questionnaire primary means of collecting information adopted by the researcher that, the research sample of (90) individuals, including the Angels nursing, has been using the statistical program spss for the purpose of conducting statistical treatments, and through the diagnosis and m
... Show Morethe research was exposed to a study the importance of the role of the supportive entities in providing the useful information to the tax administration and their ability to extend the level of the tax base of taxpayers, through the improvement of the tax payers determination and their tax settle for the purpose of increasing the tax revenue, and shed light on the legal evidence through which these entities become officially assigned to perform a supplementary task to the General Committee for Taxes GCT, to help it to perform its task efficiently, and to study the reasons of the weak cooperation of the supportive entities and their reluctance to provide useful information which leads to limiting the tax base.
The research data hav
... Show MoreBackground: Optimal root canal retreatment was required safe and efficient removal of filling material from root canal. The aim of this in vitro study was to compare the efficacy of reciprocating and continuous motion of four retreatment systems in removal of root canal filling material. Materials and Methods: Forty distal roots of the mandibular first molars teeth were used in this study, these roots were embedded in cold clear acrylic,roots were instrumented using crown down technique and rotary ProTaper systemize Sx to size F2 ,instrumentation were done with copiousirrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilledwater, roots were obturated with AH26 sealer and Prota
... Show MoreBackground: Optimal root canal retreatment was required safe and efficient removal of filling material from root canal. The aim of this in vitro study was to compare the efficacy of reciprocating and continuous motion of four retreatment systems in removal of root canal filling material. Materials and Methods: Forty distal roots of the mandibular first molars teeth were used in this study, these roots were embedded in cold clear acrylic,roots were instrumented using crown down technique and rotary ProTaper systemize Sx to size F2 ,instrumentation were done with copiousirrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilledwater, roots were obturated with AH26 sealer and Prota
... Show Moreنشاطات فرع النظم السياسية
The current study shows the cytotoxicity effect of the Crassula ovata n-hexane extract on esophagus can¬cer. C. ovata is a perennial succulent plant belonging to the Crassulaceae family. In Africa, the leaves were used medicinally to cure epilepsy and diarrhoea by boiling them in milk. The hexane fraction, which is obtained through the maceration method, demonstrates the presence of many compounds that have an anticancer effect, which are ob¬tained by gas chromatography - mass spectroscopy. The phytosterol compound was isolated by a preparative thin layer chromato¬graph and was identified by liquid chromatography - mass spectroscopy. The hexane fraction was found to possess a strong anticancer effect against esophagus cancer. The
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More