Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured deterministicallyand then compared to
statistical expectations using a chi-square test.
In this paper the Run Criterion, is calculated, it can be calculated for any key generator
before it be implemented or constructed (software or hardware).The cryptosystems: Linear,
Product and Brüer are chosen as study cases.
Background: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca
... Show MoreBackground : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e
... Show MoreBegan the process of re-engineering processes in the private sector as a way to assist organizations in re-thinking how to run the business in order to improve production processes and reduce operational cost, to get to compete on a global level. That was a major restructuring by further evolution in the use of technology to support innovative operations.
Entered the technology in all areas of life and different regulations, This led to use as a change in all aspects The companies achieved success and progress today through the use of resources so as to ensure the wishes of the customers and their needs, and the requirements of the market primarily, Which is reflected on the basis of building strate
... Show MoreThe study explores the use of ergative verbs in constructing clauses and their impact on the backgrounding of the agent's role in two selected short stories. Contrary to hypothesis No. 1, the research indicates that changes in sentence patterns don't affect the meaning of the process. Additionally, hypothesis No. 2 is refuted as the middle structure is found to highlight the agent's role in the science fiction short story, Terra Infirmum, rather than concealing it as hypothesized for "The Invisible Man." The analysis uncovers that writers utilize ergative processes to narrate stories in various ways, including transitive/active voice, intransitive/active voice, and transitive/passive voice. Furthermore, the findings suggest that writers emp
... Show MoreBackground: Medicinal plants that possess antimicrobial and antioxidant properties have garnered significant attention for their role in maintaining food quality, improving safety, and impeding spoilage. They also can aid in controlling food contamination risks and augmenting the nutritional value of foods. Objective: The study aimed to obtain botanical extracts possessing antimicrobial capabilities and use them to inhibit the growth of molds and yeasts. Additionally, these extracts are aimed at prolonging product shelf life by harnessing their antioxidant attributes. Methods: Several microorganisms, including E. coli and Pseudomonas, were subjected to testing. Ethanolic alcohol, chloroform, and essential oil extracts were prepared;
... Show MoreThis work is aiming to study and compare the removal of lead (II) from simulated wastewater by activated carbon and bentonite as adsorbents with particle size of 0.32-0.5 mm. A mathematical model was applied to describe the mass transfer kinetic.
The batch experiments were carried out to determine the adsorption isotherm constants for each adsorbent, and five isotherm models were tested to choose the best fit model for the experimental data. The pore, surface diffusion coefficients and mass transfer coefficient were found by fitting the experimental data to a theoretical model. Partial differential equations were used to describe the adsorption in the bulk and solid phases. These equations were simplified and the
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreLying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou
... Show MoreThe research discusses the most important goals and means of IGAD in making peace in Sudan and then regional peace.
The research deals with the concept of a New Urbanism as an urban development strategy in the suburbs of cities or in its centers that are affected by pedestrian-oriented design and the possibility of walking, as well as integrating economic classes through the diversity of housing and its costs, and this works to facilitate access to jobs and services while providing more diverse neighborhoods and reducing the use of cars , As designing separate houses in the suburbs and increasing car trips poses a threat to the environment and the quality of urban life, and thus the new urban provides a good strategy for developing
... Show More