Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreThis work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta
... Show MoreEnhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras
... Show MoreOff-nucleus isotropic magnetic shielding (σiso(r)) and multi-points nucleus independent chemical shift (NICS(0-2 Å)) index were utilized to find the impacts of the isomerization of gas-phase furfuraldehyde (FD) on bonding and aromaticity of FD. Multidimensional (1D to 3D) grids of ghost atoms (bqs) were used as local magnetic probes to evaluate σiso(r) through gauge-including atomic orbitals (GIAO) at density functional theory (DFT) and B3LYP functional/6-311+G(d,p) basis set level of theory. 1D σiso(r) responses along each bond of FD were examined. Also, a σiso(r) 2D-scan was performed to obtain σiso(r) behavior at vertical heights of 0–1 Å above the FD plane in its cis, transition state (TS) and trans forms. New techniques fo
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreIdentifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration
... Show MoreRation power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems
... Show MoreA nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.
Diesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show MoreDiesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show More