This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of memory), also the system uses secret keys with array of keys (weights of NN), that change at each iteration
This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThe tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).
The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?
The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the
... Show MoreThis article introduces a numerical study on heat exchange and corrosion coefficients of Zinc–water nanofluid stream in a circular tube fitted with swirl generator utilizing CFD emulation. Different forms of swirl generator which have the following properties of plain twisted tape (PTT) and baffle wings twisted tape (BTT) embeds with various ratio of twisting (y = 2.93, 3.91 and 4.89), baffle inclination angles (β = 0°, - 30° and 30) joined with 1%, 1.5% and 2% volume fraction of ZnO nanofluid were utilized for simulation. The results demonstrated that the heat and friction coefficients conducted by these two forms of vortex generator raised with Reynolds number, twist ratio and baffle inclination angles decreases. Likewise, t
... Show MoreAbstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.
Random laser gain media is synthesized with different types of dye at the same concentration (1×10-3 M) as an active material and silicon dioxide NPs (silica SiO2) as scatter centers through the Sol-Gel technique. The prepared samples are tested with UV–Vis spectroscopy, Fluorescence Spectroscopy, Field Emission Scanning Electron Microscopy (FESEM), and Energy Dispersive X-ray Diffraction (EDX). The end result demonstrates that doped dyes with silica nanoparticles at a concentration of 0.0016 mol/ml have lower absorbance and higher fluorescence spectra than pure dyes. FESEM scans revealed that the morphology of nanocrystalline silica is clusters of nano-sized spherical particles in the range (25-67) nm. It is con
... Show MoreThe laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreSolid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t
... Show More