In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream.
An experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .
In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.
The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t
... Show Moreتستند أغلب الطرائق الحصينة على فكرة التنازل عن جانب معين مقابل تقوية جانب آخر من خلال عدة أساليب أما آليات الذكاء الصناعي تحاول عمل موازنة بين الضعف والقوة للوصول إلى أفضل الحلول بأسلوب بحث عشوائي . في هذا البحث تم تقديم فكرة جديدة لتحسين مقدرات معلمات نماذج المعادلات الآنية الخطية الناتجة من طريقة المتغيرات المساعدة حسب طريقة جاكنايف Jackknife Instrumental Variable Estimation(JIVE) وذل
... Show MoreToxoplasmosis is the most common, widespread disease in the world which is caused by Toxoplasma gondii.The objective of the current study is to determine the effect of the Toxoplasma gondii infection on male sperm, especially on the mitochondria of sperm for men who suffer infertility and the possibility of a hereditary mutation. Sixty seminal fluid and serum samples were taken from sub- fertile patients who attended Teba center for in vitro fertilization / Babylon and similarly samples were also obtained from healthy individuals as a control group, their ages ranged from 20 to 60 years old during the period from 1st may /2016 till 25th January/2017. All samples subjected to the tests included Macroscopic and microscopic examination, molecu
... Show MoreCoeliac disease is an immunologically mediated disease of the small intestinal mucosa, characterized by flattening of the small intestinal villi, increased numbers of intra-epithelial lymphocytes and inflammatory cell infiltrates in the lamina propria, resulting in gut damage and nonspecific malabsorption of nutrients. The disease is elicited by ingestion of gluten, a protein found in several cereals, principally wheat, but also barley and to a lesser extent, oats. Successful treatment is avoidance of dietary gluten. Long-standing evidence suggests a T-cell-mediated response to peptides derived from the gliadin fraction of wheat gluten, leading to immunologically mediated intestinal injury in genetically susceptible individuals. The
... Show MoreTwelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).
ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va
... Show MoreFourteen morphologically varied Ricinus communis L. seeds were collected from different localities in Egypt, El-Sudan and Saudi Arabia. Seed morphology and ITS barcoding analysis were performed to assess their diversity and phylogenetic relationship. Sequence’s alignment of nrITS region from different accessions display high levels of genetic similarities. Cluster analysis could not group different accessions according to their geographical distribution. Nevertheless, the genetic barcodes are interestingly matched with the morphological features of the Ricinus seeds. In conclusion, seed morphology proved to be a valuable tool in evaluating biodiversity and phylogenetic relationship in plant species with different loca
... Show MoreIn this research, analytical study for simulating a Fabry-Perot bistable etalon (F-P cavity) filled with a dispersive optimized nonlinear optical material (Kerr type) such as semiconductors Indium Antimonide (InSb). An optimization procedure using reflective (~85%) InSb etalon (~50µm) thick is described. For this etalon with a (50 µm) spot diameter beam, the minimum switching power is (~0.078 mW) and switching time is (~150 ns), leading to a switching energy of (~11.77 pJ) for this device. Also, the main role played by the temperature to change the etalon characteristic from nonlinear to linear dynamics.
Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show More