A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statistical tests of the generated sequence of bits are investigated by applying five evaluations as well as the ACF and NIST. The results of five standard tests of randomness have been illustrated and overcome a value of 0.160 in frequency test. While the run test presents the pass value t0=4.769 and t1=2.929. Likewise, poker test and serial test the outcomes was passed with 3.520 for poker test, and 4.720 for serial test. Finally, autocorrelation test passed in all shift numbers from 1 to 10.
Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreIn this work, varying compositions of SiO2 micro filler were added
with the Polyvinyl Chloride (PVC) and samples have been prepared
using film casting technique. The results have been analyzed and
compared for PVC samples with (1 wt%, 3 wt%, 5 wt% and 10 wt%)
SiO2 micro filler. Mechanical characteristics such as tensile strength,
elongation at break and Young`s modulus were measured for all the
samples, where the tensile strength was increased from 8.39 Mpa for
purified PVC to 16 Mpa for 3% SiO2/PVC composite. Also, thermal
conductivity measurement values illustrated that composite materials
have a good thermal insulation at 10 wt. %, thermal conductivity was
decreased from 0.1684 W/m.
The chemical bath deposition technique (CBD) is considered the cheapest and easiest compared with other deposition techniques. However, it is highly sensitive to effective parameter deposition values such as pH, temperature, and so on. The pH value of the reaction solution has a direct impact on both the nucleation and growth rate of the film. Consequently, this study presents a novel investigation into the effect of a precise change. in the pH reaction solution value on the structural, morphological, and photoresponse characteristics of tin monosulphide (SnS) films. The films were grown on a flexible polyester substrate with pH values of 7.1, 7.4, and 7.7. The X-ray diffraction patterns of the grown films at pH 7.1 and 7.4 confirmed
... Show MoreIncremental sheet forming (ISF) process offers a high degree of flexibility in the manufacturing of different sheet parts, which makes it an ideal candidate for prototype parts as well as efficient at fabricating various customized products at low production costs compared to traditionally used processes. However, parts produced in this process exhibit notable geometrical inaccuracy and considerable thickness reduction. In this paper, the single point incremental sheet forming variant of the process has been implemented to manufacture a highly customized cranial implant starting from the computed tomography (CT) scan data of the patient's anatomy. A methodology, from the modeling to the realization of the implant, is presented and discus
... Show MoreThe research aims to identify the role of strategic improvisation as an independent variable with its dimensions (Building the Solution, Intuition, Adaptation, and Spontaneity) and the Entrepreneurial Orientation as a dependent variable with its dimensions (Identifying Opportunities, Creativity, Adopting risk, and Vision). This research has been applied in the Rafidain Bank and its branches (Sunk, People, Al-Firdaws, and Alawiya); it used the questionnaire as a basic tool for collecting information. The sample was intentionality, which included all the heads of departments in the bank’s branches, which amounted to (33) workers, and data on the questionnaire paragraphs of 28 were processed using the SPSS V.23 and AMOS V.23). The most impor
... Show MoreDetermining risk indicators for dental implants is an essential strategy for preventing peri-implant diseases and effective diagnosis of dental implant success. To investigate the impact of certain potential factors on the osseointegrated dental implant. Eighty-four individuals were included in our study, 50 cases as a patient’s group and 34 participants as a control group. All cases were diagnosed based on certain criteria, 30 (60%) of patients had peri-implantitis, 20 (40%) with severe periimplantitis, 36(72%) were generalized, and 15 (30%) as localized peri-implantitis cases. The study has indicated that 44.7% of dental implants were in the anterior maxilla, followed by (27.3%) posterior maxilla, (17.4%) posterior mandible, and (10.4%)
... Show More