As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.
Background: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images.
... Show MoreIn this research , we study the inverse Gompertz distribution (IG) and estimate the survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes
Abstract: A novel design of Mach Zehnder Interferometer (MZI) in terms of using special type of optical fiber that has double clad with graded distribution of the refractive index that can be easily implemented practically was suggested and simulated in this work. The suggested design is compact, rapid, and is simple to be modified and tested. The simulated design contains a MZI of 1546.74 nm of central wavelength that is constructed using special type of double clad optical fiber that has two different numerical apertures. The first aperture will supply single mode propagation via its core, while the second numerical aperture supports a zigzag wave propagation (multimode) in the first clad region. The interferometer’s
... Show MoreWater has a great self-generating capacity that can neutralize the polluting interventions carried out by humans. However, if human activities continue this uncontrolled and unsustainable exploitation of this resource, this regenerating capacity shall fail and it will be jeopardized definitively. Shatt Al-Arab River in South of Iraq. It has an active role in providing water for irrigation, industry, domestic use and a commercial gateway to Iraq. in the last five years Shatt Al-Arab suffered from a rise in pollutants due to the severe decline in sewage networks, irregular networks and pesticide products, as well as the outputs of factories and companies that find their way to water sou
A phytoremediation experiment was carried out with kerosene as a model for total petroleum hydrocarbons. A constructed wetland of barley was exposed to kerosene pollutants at varying concentrations (1, 2, and 3% v/v) in a subsurface flow (SSF) system. After a period of 42 days of exposure, it was found that the average ability to eliminate kerosene ranged from 56.5% to 61.2%, with the highest removal obtained at a kerosene concentration of 1% v/v. The analysis of kerosene at varying initial concentrations allowed the kinetics of kerosene to be fitted with the Grau model, which was closer than that with the zero order, first order, or second order kinetic models. The experimental study showed that the barley plant designed in a subsu
... Show MoreThe aim of this study is to identify the effect of particle size and to increase the concentration of Iraqi bentonite on rheological properties in order to evaluate its performance and to know if it can be used as drilling fluid without additives or not. In this study, Iraqi bentonite was carried out by mineral composition (XRD), chemical composition (XRF) and Particle size distribution (PSD), and its rheological properties were measured at different particle size and concentration. The results showed that when the particle size of Iraqi bentonite decreased, and the rheological properties were increased with increased concentration of Iraqi bentonite. Also, Iraqi bentonite was unable to use as drilling fluid without certain additives.
... Show MoreGroundwater is an important resource that can be used for various purposes. Various factors can change the chemistry of the GW, such as the chemical composition of an aquifer as well as the leaching of human waste into groundwater. The study area is a barren land covered by some sabkhas, in addition to some agricultural fields. The study aims to assess groundwater quality for drinking purposes using the Water Quality Index. The groundwater is chemically heterogeneous and has a wide quality range from very poor to excellent. Evaporation appears to be the controlling factor among the other shallow waters, while relatively deep water is related to rock-soil dominance. Rocks, land use and land cover have helped control the groundwater q
... Show MoreIn this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the
... Show More