As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.
Because of cost-effective production and abundant resources of calcium, Ca-ion batteries (CIBs) are an appropriate option to alternate Li-ion batteries (LIBs). A new category of anode materials for CIBs has emerged since the successful synthesis of carbon nanotubes, which are B and N doped derivatives of it. For high-performance CIBs, BC2N nanotube (BC2NNT) has been studied as promising anode materials. In order to comprehend electrochemical attributes, cycling stability, and adsorption behavior of BC2NNT, first-principles computations have been executed. Based on nuclear magnetic resonance computations, two types of hexagonal rings (B2C2N2 (I) and BC4N (II)) were specified that are non-aromatic. Ca has adsorption on B2C2N2 and BC4N with ad
... Show MoreThis research aims to address the most recent international standard in the field of insurance contracts, the International Financial Reporting Standard (IFRS17) and the theoretical framework of the standard in addition to the most important characteristics of the standard (IFRS17), as well as to identify the paragraphs of the modern standard, with the challenges its application in general and the use of the approach (inputs - operations - outputs) to present the challenges of its application in the Iraqi environment and specifically in the environment of Iraqi insurance sector companies (government), the research is based on the main premise that the identification of the requirements for the application of the International Fin
... Show MoreThis research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for
... Show MoreBackground: The highest concentrations of
blood glucose during the day are usually found
postprandialy. Postprandial hyperglycemia (PPH)
is likely to promote or aggravate fasting
hyperglycemia. Evidence in recent years suggests
that PPH may play an important role in functional
& structural disturbances in different body organs
particularly the cardiovascular system.
Objective: To evaluate the effect of (PPH) as a
risk factor for coronary Heart disease in Type 2
diabetic patients.
Methods: Sixty-three type2 diabetic patients
were included in this study. All have controlled
fasting blood glucose, with HbA1c correlation.
They were all followed for five months period
(from May to October 2008)
Solar activity monitoring is important in our life because of its direct or indirect influence on our life, not only on ionospheric communications. To study solar activity, researchers need measuring and monitoring instruments, these instruments are mostly expensive and are not available in all universities. In this paper, a very low frequency radio receiver had been designed and implemented with components available in most markets to support the researchers, college students, and radio astronomy amateurs with a minimum input voltage less than 100µV, an output voltage less than 135 m V with no distortion and an overall gain of 34dB. A comparison had been done between two circuit structures using a workbench software program and experim
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show MoreThe diabetic foot is considered one of the long term diabetes complications caused by a defect in blood vessel and nerve system. This requires dealing with diabetic foot with professional medical care, so as to prevent its development in advanced stages which could end to gangrene and amputation of the foot. This study has been initiated through follow-up of twelve patients with diabetes and the presence various occlusions in lower limb artery. One patient from them was chosen for investigation, this patient has stenosis in popliteal artery and presence multiple stenosis in superficial femoral artery. This study based on analysis present case of patient and prediction for progress stenosis in superficial femoral artery till arrive semi t
... Show MoreZiegler and Nichols proposed the well-known Ziegler-Nichols method to tune the coefficients of PID controller. This tuning method is simple and gives fixed values for the coefficients which make PID controller have weak adaptabilities for the model parameters variation and changing in operating conditions. In order to achieve adaptive controller, the Neural Network (NN) self-tuning PID control is proposed in this paper which combines conventional PID controller and Neural Network learning capabilities. The proportional, integral and derivative (KP, KI, KD) gains are self tuned on-line by the NN output which is obtained due to the error value on the desired output of the system under control. The conventio
... Show More