The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In our work, there are two types of keys; the first type is the keystream that is adopted by the stream cipher stage with optimal length (length of the keystream greater or equal the message length); and the second key type is the final weights that are obtained from the learning process within the neural network stage, So we can represent our work as an update or development for using the neural network to enhance the security of stream cipher. As a result for a powerful hybrid design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.
Abstract: A home-made dc sputtering is characterized by cathode potential of 250-2500 V and sputtering gas pressures of (3.5×10-2 – 1.5) mbar. This paper studies in experiment the breakdown of argon, nitrogen, and oxygen in a uniform dc electric field at different discharge gaps and cathode potentials. Paschen curves for Argon, Nitrogen, and oxygen are obtained by measuring the breakdown voltage of gas within a stainless steel vacuum chamber with two planar, stainless steel electrodes. The Paschen curves in Ar, N2, and O2 gases show that the breakdown voltage between two electrodes is a function of pd (The product of the pressure inside the chamber and distance between the electrodes). Current-voltage characteristics visualization of the
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreGeographical, economic, historical, environmental and security factors play a role in strengthening the drive towards union, as well as addressing the need to express regional and federal identity. This is a clear example of this tendency. One legal or one political system with the parts of this united personality retaining their privacy and identity, and there is a delegation to the central entity of the union with some of the common powers while retaining some powers for these parts or states, which means the availability of autonomy for the constituent states of the union and this is the most important characteristic of the federal states or federations It is the autonomy of each state or country participating in the union. Accordingly,
... Show MoreThis investigation is a study of the length of time where drops can exist at an oil-water interface before coalescence take place with a bulk of the same phase as the drops. Many factors affecting the time of coalescence were studied in is investigation which included: dispersed phase flow rate, continuous phase height, hole size in distributor, density difference between phases, and viscosity ratio of oil/water systems, employing three liquid/liquid systems; kerosene/water, gasoil/water, and hexane/water. Higher value of coalescence time was 8.26 s at 0.7ml/ s flow rate, 30cm height and 7mm diameter of hole for gas oil/water system, and lower value was 0.5s at 0.3ml/s flow rate, 10 cm height and 3mm diameter of hole for hexane
... Show MoreNowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show MoreBackground: War represents a major human crisis; it destroys communities and results in ingrained consequences for public health and well-being
Objective: We set this study to shed light on the public health status in Iraq after the successive wars, sanctions, sectarian conflicts, and terrorism, in light of certain health indicators.
Design: The primary source of data for this analysis comes from the Iraqi Ministry of Health, and The World Health Organization disease surveillance.
Results: Most of the morbidity indicators are high, even those that are relatively declining recently, are still higher than those repor
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThe purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε VO.