A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show More Taurodontism is a rare developmental dental anomaly marked by apical displacement of the pulpal floor, enlarged pulp chambers, and root bifurcation or trifurcation near the apex. Its etiology involves genetic mutations, syndromic associations, or developmental disturbances of Hertwig’s epithelial root sheath. Diagnosis relies mainly on radiographic assessment, with CBCT offering superior accuracy, and indices such as Shaw’s and Shifman’s aiding classification. Clinically, taurodontism complicates endodontic, surgical, orthodontic, and restorative procedures and may indicate underlying systemic disorders. Early recognition and interdisciplinary planning are crucial to optimizing patient outcomes. DOI: ht
... Show Moreيهدف هذا البحث الى التطرق الى صورة العربي كما يعرضها ادب اليافعين العبري في رواية " نادية " للكاتبة العبرية " كاليلا رون فيدر " . والتي تعد من الاديبات العبريات اللواتي تطرقن بصورة مباشرة الى موضوع ما خلف الجدار ، والصراع العربي – الإسرائيلي وانعكاساته على المجتمع الإسرائيلي بصورة عامة والمجتمع العربي بصورة خاصة . ينقسم هذا البحث إلى ثلاثة فصول، تطرق الفصل الأول إلى "ادب اليافعين"، و تاريخه ، مميزاته والفئ
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show More