Of non-Muslim minorities In the Muslim community
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky theorem of
... Show MoreRecovery of time-dependent thermal conductivity has been numerically investigated. The problem of identification in one-dimensional heat equation from Cauchy boundary data and mass/energy specification has been considered. The inverse problem recasted as a nonlinear optimization problem. The regularized least-squares functional is minimised through lsqnonlin routine from MATLAB to retrieve the unknown coefficient. We investigate the stability and accuracy for numerical solution for two examples with various noise level and regularization parameter.
Flexure members such as reinforced concrete (RC) simply supported beams subjected to two-point loading were analyzed numerically. The Extended Finite Element Method (XFEM) was employed for the treatment the non-smooth h behaviour such as discontinuities and singularities. This method is a powerful technique used for the analysis of the fracture process and crack propagation in concrete. Concrete is a heterogeneous material that consists of coarse aggregate, cement mortar and air voids distributed in the cement paste. Numerical modeling of concrete comprises a two-scale model, using mesoscale and macroscale numerical models. The effectiveness and validity of the Meso-Scale Approach (MSA) in modeling of the reinforced concrete beams w
... Show MoreIn this research, the program SEEP / W was used to compute the value of seepage through the homogenous and non-homogeneous earth dam with known dimensions. The results show that the relationship between the seepage and water height in upstream of the dam to its length for saturated soil was nonlinear when the dam is homogenous. For the non-homogeneous dam, the relationship was linear and the amount of seepage increase with the height of water in upstream to its length. Also the quantity of seepage was calculated using the method of (Fredlund and Xing, 1994) and (Van Genuchten, 1980) when the soil is saturated – unsaturated, the results referred to that the higher value of seepage when the soil is saturated and the lowe
... Show MoreIn this paper we use non-polynomial spline functions to develop numerical methods to approximate the solution of 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of these method, and to compare the computed results with other known methods.
The research topic (The Impact of the Compulsory Reserve on the Banks Credit-an applied research on a sample of Iraqi banks), was chosen on basis of the Iraqi private Banks attempts to increase their credit activities in hope to gain more profits.This coincided with the CBI aim to back the private banking market.It is thus apparent why the CBI issued its regulation to those banks to increase their capitals up to IDB250. On the other hand,the CBI acted as an obstacle in the way of increasing the private banks of their capitals,that is by implementing the quantitive monetary tool so called the compulsory reserve.This is why we intended to overlook at this contradictional problome
... Show MoreThis study aims to recognize the process of using computer in publicschools in Ma`an governorate in terms of hardware, capabilities, and teachers usage. It also aims to identify the most important obstacles those schools face from a teachers perspective.
The study sample consists of (150) teachers from different disciplines. The researcher prepared two questionnaires related to the research pivotal, then presented to a group of arbitrators to be used in this final form. The data was analyzed statistically and the study concluded that there is a shortage in the computer services provided to teachers, and there is a w
... Show More