As of late, humankind has experienced radiation issues either computerized tomography (CT) or X-rays. In this investigation, we endeavor to limit the effect of examination hardware. To do this the medical image is cropping (cut and zoom) then represented the vascular network as a graph such that each contraction as the vertices and the vessel represented as an edges, the area of the coagulation was processed already, in the current search the shortest distance to reach to the place of the blood vessel clot is computed
Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
In the present work, a Z-scan technique was used to study the nonlinear optical properties, represented by the nonlinear refractive index and nonlinear absorption coefficients of the Ag nanoparticles. In this technique, a pulsed second harmonic Nd :YAG laser at wavelength 532 nm was used. The results show that the nonlinear refractive index and nonlinear absorption coefficients of the Ag nanoparticles are found to be dependent on the size these nanoparticles.
The study tagged: (The aesthetics of balance and its relationship to the design of the body of the industrial product) discussed the role of balance in the design of industrial products of different shapes, colors and sizes, as well as their function. Based on the research problem that was determined by the following question: What is the relationship between balance and the design of the body of the industrial product? The aim of the research is to: reveal the statement of the effectiveness of the balance in the design of the industrial product body.
The study was defined in four chapters: in the first chapter, a problem, the importance, and the aim of the research were presented. The second chapter contained the theoretical framewor
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreEach school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
The purpose of this paper is to preparing exercises for using the (Blazepod) device for advanced basketball players, and then identifying the effect of using the (Blazepod) device in developing some of the player's defensive movement for advanced basketball players. 12 players from the Adhamiya Sports Club, the category of applicants for the 2022/2023 sports year, where they were chosen in a deliberate manner from the community of origin represented by clubs, and the researchers used the defender player's movement test, and the results of the study showed that the special exercises prepared by the researcher using the (Blazepod) device affected the development Defensive skills (the movement of the defending player) greatly increased among a
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More