The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
Design and construction of video extractor circuit require an understanding of several parameters, which include: Selector circuit, extracting circuit which contains sampling signal and multiplexing. At each radar pulse, the video signal is fed to one of the selector. The fast filter has a pass –band from 190 Hz to 1800 Hz. These frequencies correspond to targets having radial velocities laying between and 10 Kph and 200 Kph.Slow filter: 60 Hz to 230 Hz for radial velocities laying between 3.5 and 13 Kph.The video- extractor is organized in four PCB CG (A-B-C-D) each one having 16 selector. The sampling signal (ADS) (1-2-3-4) control the 4-line-to-16-line decoders. 8 multiplexers of 8 inputs each, are required for the multiplexing of the
... Show MoreThe performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show MoreExtracting moving object from video sequence is one of the most important steps
in the video-based analysis. Background subtraction is the most commonly used
moving object detection methods in video, in which the extracted object will be
feed to a higher-level process ( i.e. object localization, object tracking ).
The main requirement of background subtraction method is to construct a
stationary background model and then to compare every new coming frame with it
in order to detect the moving object.
Relied on the supposition that the background occurs with the higher appearance
frequency, a proposed background reconstruction algorithm has been presented
based on pixel intensity classification ( PIC ) approach.
Singled current study on the subject of shorthand in structure designs logos (Iraqi sports clubs model), as the current study Tdmt four chapters, was in the first chapter defines the research problem and its significance, as well as the aim of the research in the know shorthand formal in structure designs logos (Iraqi sports clubs model ), and identifies Find time limits: - slogans Iraqi sports clubs for the years (1956 - 1970), because it represented the years to include designs slogans official Iraqi sports clubs that have been elected in this period for the purpose of examining the reality of the design in the current search. And it represented the spatial limits: - the Republic of Iraq - Iraqi slogans designs sports
... Show MoreRecent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p
... Show MoreAsthma is a chronic inflammatory disease of airways mediated by T-helper 2 (Th2) cells involving complex signaling pathways. Although resveratrol has previously been shown to attenuate allergic asthma, the role of miRNA in this process has not been studied. We investigated the effect of resveratrol on ovalbumin-induced experimental allergic asthma in mice. To that end, BALB/c mice were immunized with ovalbumin (OVA) intraperitoneally followed by oral gavage of vehicle (OVA-veh) or resveratrol (100 mg/kg body) (OVA-res). On day 7, the experimental groups received intranasal challenge of OVA followed by 7 days of additional oral gavage of vehicle or resveratrol. At day 15, all mice were euthanized and bronchioalveolar fluid (BALF), se
... Show MoreThe most significant water supply, which is the basis of agriculture, industry and human and wildlife needs, is the river. In order to determine its suitability for drinking purposes, this study aims to measure the Water Quality Index (WQI) of the Tigris River in the Salah Al-Din Province (center of Tikrit), north of Baghdad. For ten (9) physio-chemical parameters, namely turbidity, total suspended sediments, PH, electrical conductivity, total dissolved solids, alkalinity, chloride, nitrogen as nitrate, sulphate, and then transported for examination to the laboratory, water samples were collected from 13 locations along the Tigris river. Using the weighted arithmetic index method, the WQI was measured and found to be 105,87 in up-stream, wh
... Show MoreStudents' passive listening to their teacher's reading is one of main
reasons behindtheir weakness in the reading skill which in its turn may
hinderachieving the in desired objectives.
When exploiting critical thinking, which will lead to deeper
understanding of the intellectual content, in learning and accurate and
correct students' outcomes.
Active listening allows paying attention to the speaker, asking him,
arguing with him, judging what he says, and making decision on what
he says. For this reason, the researcher felt the need for preforming a
study to identify the effect of critical listening on developing students'
critical thinking at reading in the Kurdish language department.
The researcher has