As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.
This research was distributed into two sections, the first section was concerned with the concept of value for De Saussair and its methodological impact on his linguistic structural conceptions with respect of the distinction between synchronism and diachronism, the value role of linking function between the sounds and the though, the basing of his theoretical conception on the language being a form and not a material according to this principle and the value impact on the demonstration that the linguistic element acquires its functional importance from the relations inside the language system. It also stopped at the methodological impact of value on defining the analytical linguistic unit and the value role in semantics through the prin
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreMedicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep lea
... Show MoreCongenital absence of anterior cruciate ligament is highly uncommon occurrence. It has since been documented as a standalone anatomical entity or, more frequently, in conjunction with other congenital anomalies. Surgical treatment for this patient population has only been reported in very few cases. In this article, we share our experience in managing a case of unilateral congenital deficiency of anterior cruciate ligament (ACL) in a 13 years old female patient by physeal sparing arthroscopic ACL reconstruction, using All-inside technique.
The article reflects the results of the analysis of the use of metaphors as one of the main means used by Lyudmila Ulitskaya when writing the novel “Sincerely Yours Shurik” to form the image of the main hero in the novel. The main purpose of the article is to consider metaphors, which helped the author to form the image of the main character Shurik in the text space through the stages of his life path, closely related to the people around him, who is always happy to be useful (hence the title "Sincerely Yours"), among which the female images of his relatives, girlfriends and others stand out as a special layer in the narrative. And in the course of the study, the following tasks were solved: the metaphors that make up the image of the
... Show MoreAbstract
The current research is attempt to test the reflection of the lean management on the human resources management practices of two of the most important communication companies operating in Iraq (`Zain & Asia cell), The research aims to Determine the extent of adoption of the lean management approach in the two researched companies, as it improving human resource management practices. The research problem represented in the existence of lack of in some aspects of the application the lean management approach in service sector and neglecting the impact of its tools on the human resource management practices. For this purpose three principle research hypotheses has been formulated, first there is a correlation rel
... Show MoreThe aim of this study is to utilize the electromembrane extraction (EME) system as a manner for effective removal of zinc from aqueous solutions. A novel and distinctive electrochemical cell design was adopted consisting of two glass chambers, a supported liquid membrane (SLM) housing a polypropylene flat membrane infused with 1-octanol and a carrier. Two electrodes were used, a graphite as anode and a stainless steel as cathode. A comprehensive examination of several influential factors including the choice of carrier, the applied voltage magnitude, the initial pH of the donor solution, and the initial concentration of zinc was performed, all in a concerted effort to ascertain their respective impacts on the efficiency of zinc elim
... Show MoreIn this study used three methods such as Williamson-hall, size-strain Plot, and Halder-Wagner to analysis x-ray diffraction lines to determine the crystallite size and the lattice strain of the nickel oxide nanoparticles and then compare the results of these methods with two other methods. The results were calculated for each of these methods to the crystallite size are (0.42554) nm, (1.04462) nm, and (3.60880) nm, and lattice strain are (0.56603), (1.11978), and (0.64606) respectively were compared with the result of Scherrer method (0.29598) nm,(0.34245),and the Modified Scherrer (0.97497). The difference in calculated results Observed for each of these methods in this study.
In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the
... Show More