True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
This paper introduces a complete design and simulation of a controller for the double fed induction generator (DFIG) turbine. The work also included the solar updraft tower (SUT) design to supply Al-Mahmoudia hospital in Baghdad/Iraq. The design includes the daily average load estimation, annual solar irradiance and, temperature monitoring, and logging.
According to the data obtained from the Ministry of Science and Technology, Baghdad has low wind speed. Therefore, the (SUT) has been designed to generate electrical power depending on the difference between the external and internal air temperature. The temperature difference will generate a suitable airspeed to drive the wind turbine, connected to the proposed (DFIG) generators
... Show MoreThe research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi
... Show MoreABSTRACT Purpose: the aim of this in vitro study was to compare the marginal gap and internal fitness between single crowns and the crowns within three-unit bridges of zirconium fabricated by CAD-CAM system. Materials and methods: A standard model from ivoclar company was used as a pattern to simulate three-units bridge (upper first molar and upper first premolar) as abutments used to fabricate stone models, eight single crowns for premolar and eight of three units bridges. Crowns and bridges fabricated by CAD-CAM system were cemented on their respective stone models then sectioned at the mid-point buccolingaully and misiodistaly and examined under stereomicroscope. Result: the marginal gap in premolar crowns and premolar within bridge we
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show More