Preferred Language
Articles
/
ZxcBWJIBVTCNdQwC5qzY
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling. 

Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Image And Video Technology: 8th Pacific-rim Symposium
A New Scheme for QoE Management of Live Video Streaming in Cloud Environment
...Show More Authors

Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
The Electro-Excitation Form Factors for Low-Lying States of 7Li Nucleus
...Show More Authors

The transverse electron scattering form factors have been studied for low –lying excited states of 7Li nucleus. These states are specified by J? T= (0.478MeV), (4.63MeV) and (6.68MeV). The transitions to these states are taking place by both isoscalar and isovector components. These form factors have been analyzed in the framework of the multi-nucleon configuration mixing of harmonic oscillator shell model with size parameter brms=1.74fm. The universal two-body of Cohen-Kurath is used to generate the 1p-shell wave functions. The core polarization effects are included in the calculations through effective g-factors and resolved many discrepancies with experiments. A higher configuration effect outside the 1p-shell model space, such

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Water Environment Research
Combining Electro Fenton With Adsorption Processes for Treatment of Petroleum Refinery Wastewater
...Show More Authors
ABSTRACT<p> This study investigates the elimination of chemical oxygen demand (COD) from an Iraqi petroleum refinery effluent through a combined electro‐Fenton and adsorption process (EF+AC). Response surface methodology (RSM) with a Box–Behnken design (BBD) was employed to investigate the effects of FeSO <sub>4</sub> concentration, current density, and electrolysis time on the reduction of COD using the EF technique. According to the results of the analysis of variance (ANOVA) for the EF technique, FeSO <sub>4</sub> concentrations, with a contribution of 40.06%, and cur</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
Numbers and Its Uses in the Al-Abbass Holy Shrine
...Show More Authors

The present research studies numbers and its uses in the Islamic ornament. The study consists of four chapters; the first is dedicated to the problem of the research, the value of the study, and the aim of the study, and its limit. The problem of the study deals with the uses of numbers in Islamic ornament and how these numbers were used for aesthetic purposes. What are the analytical bases that enable us to read the geometrical compositions ornament numerically? The value of the research is the study forms an analytical and visual study of the numbers in the Islamic ornamentation. Additionally, this study is an aesthetic assessment to the philosophy of the number and its uses in Islamic architecture. The study is limited to the ornament

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The of Effect Instructional Design based on Kagan Structure In Generating Information Skills for First Intermediate Student’s In Mathematics
...Show More Authors

 

The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Internet Protocol Technology
A low cost paging scheme for clustered PMIPv6 protocol by head-MAG entity utilisation
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Estimation of Parameters for the Gumbel Type-I Distribution under Type-II Censoring Scheme
...Show More Authors

This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme
...Show More Authors

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref