A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalence (L) of the sequence of period (p) when (L) is greater than (p/2). Several examples are given for conciliated the accuracy of the results of this proposed method.
In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreIn this paper, we construct a new mathematical system as Multiplicative Cyclic Group (MCG), called a New Digital Algebraic Generator (NDAG) Unit, which would generate digital sequences with good statistical properties. This new Unit can be considered as a new basic unit of stream ciphers.
A (NDAG) system can be constructed from collection of (NDAG) units using a Boolean function as a combining function of the system. This system could be used in cryptography as like as Linear Feedback Shift Register (LFSR) unit. This unit is basic component of a stream cipher system.
The measurement data of the raw water quality of Tigris River were statistically analyzed to measure the salinity value in relation to the selected raw water quality parameters. The analyzed data were collected from five water treatment plants (WTPs) assembled alongside of the Tigris River in Baghdad: Al-Karkh, Al-Karama, Al-Qadisiya, Al-Dora, and Al-Wihda for the period from 2015 to 2021. The selected parameters are total dissolved solid (TDS), electrical conductivity (EC), pH and temperature. The main objective of this research is to predicate a mathematical model using SPSS software to calculate the value of salinity along the river, in addition, the effect of electrical conductivi
The fractional order partial differential equations (FPDEs) are generalizations of classical partial differential equations (PDEs). In this paper we examine the stability of the explicit and implicit finite difference methods to solve the initial-boundary value problem of the hyperbolic for one-sided and two sided fractional order partial differential equations (FPDEs). The stability (and convergence) result of this problem is discussed by using the Fourier series method (Von Neumanns Method).
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreA new Turbidimetric method characterized by simplicity, accuracy and speed for determination of Hydronium ion by continuous flow injection analysis. The method was based on the formation of complex Zn3[Fe(CN)6] for Zinc(II) that was eluted by Hydronium ion from cation exchanger column with Potassium hexacyanoferrate(III) for the formation of a pale yellow precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.7 mL.min-1 flow rate using H2O as a carrier stream, 1.7 mL.min-1 reagent stream, 110 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.01-0.1 mol.L-1 for each acids (HClO
... Show MoreA new Turbidimetric method characterized by simplicity, accuracy and speed for determination of Hydronium ion by continuous flow injection analysis. The method was based on the formation of complex Zn3[Fe(CN)6] for Zinc(II) that was eluted by Hydronium ion from cation exchanger column with Potassium hexacyanoferrate(III) for the formation of a pale yellow precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.7 mL.min-1 flow rate using H2O as a carrier stream, 1.7 mL.min-1 reagent stream, 110 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.01-0.1 mol.L-1 for each acids (HClO
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence