Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Background: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca
... Show MoreThis research was conducted to measure the safety of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli, through studying its toxic effect on human blood lymphocyte, since it showed a promising effect in reducing the proliferation of colorectal cancer cells. the cytogenetic effects of (STa) by using five different concentrations (100, 200, 400, 800 and 1600μg/ml) in comparison with negative (PBS, Phosphate buffer saline) and positive (MMC, Mitomycin C) at concentration of 5μg/ml, controls on human blood lymphocytes obtained from both (10) normal healthy persons and (20) colorectal cancer patients was measured by employing the following parameters: mitotic index, blast index, chromosomal aberrations and micronucle
... Show More- Islamic art is applied art that searches for everything that is useful and beneficial and Both are properties of Islamic art. Islamic art has many well-established elements and styles and pictures that distinguish it from the rest of the arts among those elements and methods that were used in the architectural cladding artwork Or mosaic murals and mosaic was known in its first form in Babylon in a primitive style similar to it, but the Muslim artist in the era of the Caliphs made the art of mosaic In mosques and palaces.
Chapter one: This chapter is concerned with introducing the art of mosaic historically and focusing on it.
Chapter Two: This chapter deals with contemporary Islamic mosaics, especially in Mecca
Contemporary management is interested in the process of performance assessment because of its significance in the field of planning and controlling the multiactiveties to attain its goals and uncovering digression of virtual performance after comparing it with the plan or equitable performance.
Digression is analyzed to enable management control centers of authority.
Assessment process significance is closely related by setting definite categories to evaluate the economic activity to know the ability to achieves aims.
This study concentrated on the most important categories that used to evaluate company understudy with ather categories suggested to complete assessment process.
This study is in
... Show MoreRecurrent respiratory tract infections are responsible for about 85% of all diseases in childhood, and are associated with significant morbidity and mortality. The aim of this study is to evaluate the main causes underlying recurrent respiratory tract infections in 176 pediatric patients aged 2 month to 4 year and weight from 4 to11 kg referred to the child center hospital and Al-sader hospital prospective study.All parents were given information sheet which then analyzed and the percentage of incidence of causes were recorded, we found that higher % related to many causes; mostly related to the parent like poor family education, mother carelessness, incomplete vaccination, other related to empirical diagnosis, and short course of t
... Show More