There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
This research seeks to study the role of proactive leadership as an essential element that helps all federations that lead the wheel of sports, including the Iraqi Handball Federation, so that it builds a correct environment that helps manage the organizational errors that the Handball Federation may fall into, and this in turn helps in early detection of errors and obstacles that may occur. It is likely that the Federation will fall into the process of managing and organizing the Iraqi Handball League, in addition to increasing the clubs’ ability to assist the Iraqi Handball Federation by being proactive so as not to make mistakes. The research community included the administrative bodies of the clubs participating in the Iraqi E
... Show MoreThe research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show MoreThe mysterious letters, the philosophy of existence and the meaning of these letters in the Qur'an is one of the mysterious issues that has always occupied the minds of Interpreters. Each Interpreter has tried to provide his own interpretation and understanding of these mysterious letters. Since these letters are part of the surah of the Qur'an and at the same time, the appearance of these letters, unlike other verses, does not indicate meaning, the commentators have approached these verses with their preconceptions. In this article, an attempt has been made to investigate the role of pre-interpreters of descriptors in a descriptive and analytical method in finding the meaning of syllables. However, each of them has tried to interpret th
... Show MoreThis study aims to examine the sources of organizational power prevailing among the academic leaders at the University of Tabuk from the faculty members’ viewpoint. The purposes behind such an aim are: to reveal the level of administrative and technical institutional creativity, the nature of the relationship between the reality of organizational power and the level of institutional creativity, and to disclose statistically the significant differences between the averages of faculty members’ responses attributed to the demographic variables (gender, years of experience, academic degree). The study used the descriptive approach, both survey and correlational. A questionnaire was used to collect data from a simple random sample o
... Show MoreThis paper presents a hierarchical model of localized company effective when is used in a university campus or site. To highlight the standard criteria for each layer of the model and to prove the positive aspects of this model is the best in use and make the Dell Network as case of study. Through the case of study it has been shown that the expansion of the on-site network does not affect services or bandwidth.
A theoretical calculations of the rate constant of electron transfer (ET) in a dye – semiconductor system with variety solvent are applied on system contains safranineT dye with TiO2 in many solvents like water, 1-propanol, Formamide, Acetonitrile and Ethanol.
A matlap program has been written to evaluate many parameters such that, the solvent reorganization energy, effective free energy, activation free energy, coupling matrix element and the rate constant of electron transfer.
The results of the rate constant of electron transfer calculated theoretically are in a good agreement with experimental and theoretical value
... Show MoreIt is widely accepted that early diagnosis of Alzheimer's disease (AD) makes it possible for patients to gain access to appropriate health care services and would facilitate the development of new therapies. AD starts many years before its clinical manifestations and a biomarker that provides a measure of changes in the brain in this period would be useful for early diagnosis of AD. Given the rapid increase in the number of older people suffering from AD, there is a need for an accurate, low-cost and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, the electroencephalogram (EEG) can play a vital role in this but at present, no reliable EEG biomarker exists for early diagnosis of AD. The gradual s
... Show MoreThis research is based on the idea of showing the extent to which the public relies on satellite channels as sources for news of the demonstrations in Iraq .This was the essence of the problem for which the researcher set several goals, including knowing the public’s confidence in the news of these satellite channels and comparing them with others. The researcher chose an available intended sample of (117) respondents in Baghdad - Karkh and Rusafa by adopting the survey method and applying a questionnaire form and the theory of media dependence for the period from 15/11/2019 to 1/1/2021 . By using statistical methods, the researcher reached many results, the most important of which are: Satellite channels are a source for 79% of the pu
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More