Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this work we reported the synchronization delay in
semiconductor laser (SL) networks. The unidirectional
configurations between successive oscillators and the correlation
between them are achieved. The coupling strength is a control
parameter so when we increase coupling strength the dynamic of the
system has been change. In addition the time required to synchronize
network components (delay of synchronization) has been studied as
well. The synchronization delay has been increased by mean of
increasing the number of oscillators. Finally, explanation of the time
required to synchronize oscillators in the network at different
coupling strengths.
Abstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreObjectives: Umbilical cord blood can be taken at birth and largely gives indication of fetal and maternal conditions. The aim of the study was to investigate the relation between sex hormones in cord blood and birth weight of newborns and pregnancy complications. Methods: Fifty cord blood samples were collected from newborns at labor room of Baghdad Teaching Hospital between May and October 2018. Blood was withdrawn from their mothers for lead analysis. Five milliliters (ml) of cord blood was taken, 3 ml was used for testosterone and estradiol analysis (using enzyme-linked immunosorbent assay) and 2 ml for lead measurement by lead care analyzer. Newborns weight and head circumference were measured. Delivered women were divided into four gro
... Show MoreAbstract
In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.
Objective: One of the most important practical deficiencies of present denture base materials is fracture, therefore many
attempts have been made to reinforce of the repaired denture base resin. A desirable objective for this service is to obtain
optimum strength for repairs, which can be achieved by making available a good bond between original and repaired
materials.
Methodology: The present study was carried out to evaluate and compare the transverse strength of acrylic specimens
repaired by two different materials (hot-cure and cold-cure acrylic resin). A total of 50 specimens were prepared by hot
(40) repair: (10) by hot with retention bead, (10) by cold with retention bead and (10) repair by hot only, (10) repair
Since her early beginning in 1974 in her novel "Les armoires vides", Annie Ernaux writing about life in all its various aspects remained her main goal. This novel gave the earliest signals of what would happen later on in her literary career. Indeed, her works showed abilities of echoing reality, her sufferance and experiences via the use of simple and clear language. Add to this, her writings are to be viewed as an expression of deep felt journey, and a continuous search due to the consequent changes coming out of her identity.
We try here to give an answer to the question about writing as to whether being, to Ernaux herself, a need for the search about her social and feminist identity, or a pure literary work
... Show MoreBackground: Coronavirus pandemic (COVID-19) has enormously affected various healthcare services including the one of community pharmacy. The ramifications of these effects on Iraqi community pharmacies and the measures they have taken to tackle the spread of COVID-19 is yet to be explored. In this cross sectional survey, infection control measures by community pharmacies in Sulaimani city/Iraq has been investigated.
Methods: Community pharmacists were randomly allocated to participate in a cross-sectional survey via visiting their pharmacies and filling up the questionnaire form.
Results and discussion:
... Show MoreThe degradation and mineralization of 4-chlorophenol (4-CP) by advanced oxidation processes (AOPs) was investigated in this work, using both of UV/H2O2 and photo-Fenton UV/H2O2/Fe+3 systems.The reaction was influenced by the input concentration of H2O2, the amount of the iron catalyst, the type of iron salt, the pH and the concentration of 4-CP. A colored solution of benzoquinon can be observed through the first 5 minutes of irradiation time for UV/H2O2 system when low concentration (0.01mol/L) of H2O2 was used. The colored solution of benzoquinon could also be observed through the first 5 minutes for the UV/H2O2/Fe+3 system at high
concentration (100ppm) of 4-CP. The results have shown that adding Fe+3 to the UV/H2O2 system enhanced
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More