In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe aim of the research is a techno-economic analysis of the use of concentrated solar energy technologies in the Iraqi city, considering the concentrated solar energy technology is a renewable energy technology that derives its resources from the sun and is replenished at a rate that exceeds its use. It is also inexhaustible and environmentally friendly energy from its environmental footprint, unlike traditional fossil energy which produces greenhouse gases and a major cause of global warming.
This research measures the costs of concentrated solar energy technology to Reduce the effects caused by other energies and work to fill part of the shortfall in the total electricity production, even at a specific percentage, in preparati
... Show MoreTotal quality management considers one of the modern scientific entrances which practiced by productivity service organizations alike to provide appropriate quality required outputs according to the needs and desires of customers manage , enable the organization seeking to continue and grow in light of the increasing competition from the satisfy and provide the appropriate total quality management requirements whenever led to face risks that they may have in a manner in which they can be addressed and find ways to avoid them in the future when repeated. &n
... Show More<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreA total of (90) blood samples were collected from male patients infected with Toxoplasmosis who recovered from COVID- 19 and attended Kamal Alsamiraai Hospital from 15 January to 15 September 2021. We measured anti-Toxoplasma antibodies (IgG and IgM) detected by ELISA, whereas Anti-COVID-19 antibodies (IgG and IgM) were estimated using Elisa and Afilias. The semen characteristics were also studied among fertile, healthy individuals (control group) and sub-fertile patients. Results showed that the mean sperm count was high among the control group (40.5±1.3x 106/ml) compared with that of the sub-fertile patients (10.3±1.75 and 8.8±1.9 x 106/ml for oligozoospermia, and oligoasthenozoospermia respectively), and it was the highest (44.7±1.4
... Show More