A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreTwelve compounds containing a sulphur- or oxygen-based heterocyclic core, 1,3- oxazole or 1,3-thiazole ring with hydroxy, methoxy and methyl terminal substituent, were synthesized and characterized. The molecular structures of these compounds were performed by elemental analysis and different spectroscopic tequniques. The liquid crystalline behaviors were studied by using hot-stage optical polarizing microscopy and differential scanning calorimetry. All compounds of 1,4- disubstituted benzene core with oxazole ring display liquid crystalline smectic A (SmA) mesophase. The compounds of 1,3- and 1,4-disubstituted benzene core with thiazole ring exhibit exclusively enantiotropic nematic liquid crystal phases.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreThis paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreAbstract
Objective(s): To evaluate blended learning in nursing education at the Middle Region in Iraq.
Methodology: A descriptive study, using evaluation approach, is conducted to evaluate blended learning in nursing education in Middle Region in Iraq from September 26th, 2021 to March 22nd, 2022. The study is carried out at two Colleges of Nursing at the University of Baghdad and University of Tikrit in Iraq. A convenient, non-probability, sample of (60) undergraduate nursing students is selected. The sample is comprised of (30) student from each college of nursing, Self-report questionnaire is constructed from the literature, for e
... Show MoreThe corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range (30–70)°C .The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature. Folic acid had on inhibiting effect on the corrosion of low carbon steel in washing water at a concentration (5× 10-4-- 5× 10-3 ) mol/dm3 over the temperature range (30–70)°C. Values of the protection efficiency were calculated from the corrosion current density .From the general results for this study, it can be seen that thermodynamic and kinetic function were also calculated (?G, ?S, ?H and Ea )
... Show MoreAlopecia areata is a common disorder, hypothesized to be autoimmune in etiology. Cortisone taken orally may stimulate new hair growth. Prednisone (orally administered steroid (has proved effective for patients with alopecia areata, but its potential side effects include weight gain, metabolic abnormalities, acne and menstrual problems.
This clinical study was designed to assess the clinical significance of the nutrient antioxidants (vitamin A, vitamin E and vitamin C) in reducing the dose of corticosteroids (prednisolone), and as a consequence, their side effects in patient with alopecia. The results of this study reveal the potential clinical significance of the therapy for two months with these antioxidants in reducing the dose
... Show More