A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statistical tests of the generated sequence of bits are investigated by applying five evaluations as well as the ACF and NIST. The results of five standard tests of randomness have been illustrated and overcome a value of 0.160 in frequency test. While the run test presents the pass value t0=4.769 and t1=2.929. Likewise, poker test and serial test the outcomes was passed with 3.520 for poker test, and 4.720 for serial test. Finally, autocorrelation test passed in all shift numbers from 1 to 10.
Objective :.
1-Find out the prevalence of alcohol and drugs addiction in two different years before and after the last
war i.e. in 2002 and in 200. 2-Study the association between the addiction
and some variables. 3-Identify the prescribed drugs and other substances that
have been abused
Methodology : A retrospective study has been conducted involving the in-patients at addiction unit-IbnRushd
psychiatric hospital in Baghdad by applying the semi-structured form based on ICD-10 criteria
of addiction and dependency with the confirmation of the specialist psychiatrist diagnosis of
dependency. Data concerning each patient admitted in the hospital was gathered to have an idea about
the problem of addiction (drugs an
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreIn this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption. No significant effect of initial Cd concentration on the removal efficiency of cadmium b
... Show MoreThe injection of Low Salinity Water (LSWI) as an Enhanced Oil Recovery (EOR) method has recently attracted a lot of attention. Extensive research has been conducted to investigate and identify the positive effects of LSWI on oil recovery. In order to demonstrate the impact of introducing low salinity water into a reservoir, simulations on the ECLIPSE 100 simulator are being done in this work. To simulate an actual reservoir, an easy static model was made. In order to replicate the effects of injecting low salinity water and normal salinity, or seawater, the reservoir is three-phase with oil, gas, and water. It has one injector and one producer. Five cases were suggested to investigate the effect of low salinity water injection with differen
... Show MoreThis study deals with an important area in the field of linguistics, namely person deixis.
The study aims at: (1) Describing the notion of deixis, its importance, and its place in the field
of linguistics, (2) Presenting a detailed illustration of person deixis, and (3) Conducting an
analysis of person deixis in one of Synge‟s plays Riders to The Sea according to Levinson‟s
model. The most important aim of these three is the third one (the analysis). To achieve this
aim, the researcher depends on Levinson‟s (1983) descriptive approach. According to the
descriptive approach of deixis, the category of person deixis can be defined as the encoding of
the participant roles in the speech situation. This encoding is r
Locking of the knee is a one of the commonest orthopedic outpatient presentation. This patient usually need magnetic resonance imaging (MRI) when there is suspected lesion in the soft tissue clinically. Meniscal tears is the first differential diagnosis when accompany with painful knee. (1, 2)Giant cell tumor (GCT) is benign a localized nodular tenosynovitis often occur in the tendon sheath , Mostly involve the hand tendons in middle age group between 30 and 50 years old , female affect more than male.(3,4) The WHO defines two well-known kinds of giant cell tumor: (1) pigmented villonodular synovitis ( generalized type), which mainly involve the joints of the lower limb and (2) giant cell tumor of the tendon sheath ( localized type)
... Show MoreIn The Name of Allah Most Gracious Most Merciful
This is a study dedicated to explaining the conditions of the end of heaven, stage by stage; And to draw the final picture of it, through the facts of the Qur’an, and to make the contextual integration of the verses of the end of heaven, and their arrangement in an intentional arrangement, a path that guides us to knowing the integrated picture of it on the Day of Resurrection, according to scientific interpretation.
The importance and usefulness of the research lies in:
Extracting the order of the stages of the end of heaven, from its first state to its last, which came in separate verses of the Qur’an, each one of which was placed in a surah that was consistent w
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreThe present study investigates the use of intensifiers as linguisticdevices employed by Charles Dickens in Hard Times. For ease of analysis, the data are obtained by a rigorous observation of spontaneously occurring intensifiers in the text. The study aims at exploring the pragmatic functions and aesthetic impact of using intensifiers in Hard Times.The current study is mainly descriptive analytical and is based on analyzing and interpreting the use of intensifiers in terms ofHolmes (1984) andCacchiani’smodel (2009). From the findings, the novelist overuses intensifiers to the extent that 280 intensifiers are used in the text. These intensifiers(218) are undistinguished
... Show More