A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the randomness tests and extending Golomb’s postulates from binary to . Some theorems and lemmas are proved to find the new testing laws that are suitable to the new sequences field. The results of using the extended randomness tests are compared to the results of binary randomness tests to guarantee that the decision of pass or fail is identical, the results also prove the precision of identicalness.
The digital communication of a product of communication and information revolution. It is characterized by accurate and comprehensive in its services and its effects, which brought changes in the structure of many communities and their organizational structures. They have significant impacts on the social systems and social relations, especially in the Arab societies, which are the focus of the globalized Western media, for many reasons: economical, political , cultural and social.
According to this perception, the Arab identity has become in an encounter with big challenges by the globalized media of trade and the media, which aims to achieve greater profits because of identity and its importance to the communities. This occurs par
MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix. In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over of length and 28 have been found.
The primary objective of this study is to monitor and collect data from the main
tributaries of Smaquli stream during rainfall storm events, which can be used to
establish relationship between suspended sediment concentration and discharge. The
Smaquli catchment is divided into two sub-catchments namely Sarwchawa and
Krosh with areas of 80.64 and 34.82 km2 respectively. Jali dam is built at watershed
outlet. Rainfall, stream discharge, and suspended sediment concentration are
monitored during ten rainfall storms in the water years (2012-2013) and (2013-
2014). Analysis of the data from the two sampling sites, shows two different
responses of suspended sediment concentrations. The Krosh sub-catchment reacts
rapi
The research aims to study the importance of applying lean accounting techniques and the tools and methods they contain, the most important of which is the “value path costs” technique and its impact on rationalizing and controlling costs, as well as reducing production costs in general and reducing quality costs in a way Special by reducing or eliminating waste and waste in both time and resources and meeting customer requirements. In order to achieve this goal, the researcher relied on the application of lean accounting tools by obtaining data related to the mill, in addition to that, the information obtained as a result of field coexistence in the mill and being able to view the records of the mill in the research sample. From the
... Show MoreSteganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
Curing of concrete is the maintenance of a satisfactory moisture content and temperature for a
period of time immediately following placing so the desired properties are developed. Accelerated
curing is advantages where early strength gain in concrete is important. The expose of concrete
specimens to the accelerated curing conditions which permit the specimens to develop a significant
portion of their ultimate strength within a period of time (1-2 days), depends on the method of the
curing cycle.Three accelerated curing test methods are adopted in this study. These are warm water,
autogenous and proposed test methods. The results of this study has shown good correlation
between the accelerated strength especially for
This research addresses a problem manifested in a main question: what is the role of the digital media in marketing the artistic products? in order to determine the role played by the digital media in the disclosure and promotion of the artistic product, its price and places of distribution, as the basic elements of the marketing mixture.
This is a descriptive research in which the researcher used the survey method to check the opinions of a sample chosen according to the (proportion) method from the research community represented by instructors and students of the college of Fine Arts- University of Dayala.
... Show MoreArabic language , like any other living languages grow and evolve ; social phenomenon
it is subject to the law of life ; therefore resemble organism also touted as the most eloquent
language and the ability to meet the needs of people in every time and place.
The contemplation of the verses of the Koran reveals a lot of means of expression
leading to the grammatical meaning of the social.
I have tried in this research that investigated the social meanings through the phenomena
of deletion and delivery delays and capture semantic landing through the meanings that lead
to psychological persuasion to comply with the orders after the rights of the divine in which
social directives.
It remains the greatest mystery o
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More