This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling.
The research aims to identify the magnitude of the impact of external debt on the gross domestic product in Morocco, and the importance of research lies in the role that external debt plays in addressing structural imbalances, if it is best disposed of according to well-studied economic plans by specialists in this regard, especially if these debts are directed with Other resources, as it helps pay the costs of these debts (debt servicing) that the external debt also raises the level of gross domestic product, and the research starts from the hypothesis that: There is an effect of foreign debt on the GDP in Morocco, has contributed in one way or another to The exacerbation of the external debt, which affected the m
... Show MoreIn this work, the nuclear electromagnetic moments for the ground and low-lying excited states for sd shell nuclei have been calculated, resulting in a revised database with 56 magnetic dipole moments and 41 electric quadrupole moments. The shell model calculations are performed for each sd isotope chain, considering the sensitivity of changing the sd two-body effective interactions USDA, USDE, CWH and HBMUSD in the calculation of the one-body transition density matrix elements. The calculations incorporate the single-particle wave functions of the Skyrme interaction to generate a one-body potential in Hartree–Fock theory to calculate the single-particle matrix elements. For most sd shell nuclei, the experimental data are well rep
... Show MoreThe Boltzmann transport equation is solved by using two- terms approximation for pure gases and mixtures. This method of solution is used to calculate the electron energy distribution function and electric transport parameters were evaluated in the range of E/N varying from . 172152110./510.VcmENVcm
The electron energy distribution function of CF4 gas is nearly Maxwellian at (1,2)Td, and when E/N increase the distribution function is non Maxwellian. Also, the mixtures are have different energy values depending on transport energy between electron and molecule through the collisions. Behavior of electrons transport parameters is nearly from the experimental results in references. The drift velocity of electron in carbon tetraflouride i
Copper, and its, alloys and composites (being the matrix), are broadly used in the electronic as well as bearing materials due to the excellent thermal and electrical conductivities it has.
In this study, powder metallurgy technique was used for the production of copper graphite composite with three volume perc ent of graphite. Processing parameters selected is (900) °C sintering temperature and (90) minutes holding time for samples that were heated in an inert atmosphere (argon gas). Wear test results showed a pronounced improvement in wear resistance as the percent of graphite increased which acts as solid lubricant (where wear rate was decreased by about 88% as compared with pure Cu). Microhardness and
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show Moreهدفت الدراسة الى الاهتمام واستغلال ماهو جديد من تقنيات واجهزة حديثة في تعليم السباحة الحرة عن طريق توجيه الاطفال على تطوير مداركهم واستيعابهم بالتطور التكنولوجي الذي يتناوله العالم ،قامت الباحثتان باعداد منهج تعليمي باستخدام نظارة الواقع الافتراضي وذالك بتوفير بيئة مشابهة للبيئة الحقيقية تحاكي مدارك عقول الاطفال في عالم افتراضي لتتكون صورة كاملة عن مهارات السباحة الحرة ،ومن هنا اتت المشكلة نتيجة تعل
... Show More