As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.
Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
The plant Zizyphus spina-christa grows wildly in the middle and southern of Iraq locally named Nabag. In this study the antibacterial activity of several different plant extract (alcoholic hot and cold extract 80%, aqueous hot and cold extract) was tested against some gram negative bacteria that related to Enterobacteriacea as follow; Pseudomonas aeruginosa, Escherchia coli Proteus mirabilis, Serratia mercesence,. Aeromonas sp, Klebsiella pneumoniae ,Shigella sp, Salmonella enteritidis (134), S. typhi(97), S. typhimurium (300) , S. typhi, . The results showed that efficient method of extract was alcoholic hot extract from other extract methods that are used in this study. The detection of active compound in crude extracts of the leaves show
... Show MoreBACKGROUND: Many genetic factors are known to be related to osteoporosis, and currently the role of the glucagon-like peptide-1 receptor (GLP-1R) gene in bone health has been studied intensively. Some variation of this gene, such as rs1042044 and rs6458093, are known to be linked to metabolic diseases and lower bone mineral density, however their specific contribution to osteoporosis remains largely unexplored. Therefore, this study was conducted to investigate the combined genotypic effect of rs1042044 and rs6458093 as a genetic risk factor for osteoporosis in postmenopausal Iraqi women.METHODS: Blood samples from 75 osteoporosis patients and 75 healthy controls, aged 45-85, were collected. DNA was extracted, and a region of GLP-1R
... Show MoreBackground: Dyslipidemia is defined as an abnormally high level of various lipids in the blood. It is considered a major risk for atherosclerosis and coronary artery disease. Genetic susceptibility can have a significant influence on the development and progression of dyslipidemia. ApoB-100 R3500Q mutation and ApoE variants are among those genetic risks for dyslipidemia. This study aims to assess the possible contribution of ApoB and ApoE variants on lipid profile among a group of early-onset ischemic heart disease (IHD) patients in comparison to a group of controls. Methods: Forty patients with dyslipidemia and early-onset IHD without chronic conditions likely to cause derangement of lipid levels were recruited to this case-control study
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThis study Arabic dialect prevailing in the province of Khuzestan [southwest Islamic Republic of Iran] as one of the Arabic dialects abundant qualities and characteristics of linguistic entrenched in the foot, which includes among Tithe thousands composed of vocabulary and structures and phrases classical that live up to the pre-Islamic era, if what Tasha researcher and reflect accurately the find of a large number of phrases and vocabulary and acoustic properties by nature accent, and formal, and nature of the synthetic, and characteristics semantic and contextual in this dialect studied without being something of them heavy on the tongue and without displays her tune or Tasha or distortion and so on all of which constitute a catalyst i
... Show MoreThe principle in the language is that each word has one meaning. This is because the purpose of language development is for understanding, understanding, and communication between people. The language is sounds with which each people expresses their Arabic language did not stop at this point, but rather needed another next stage or to convey additional features or characteristics that would qualify it. To be the language of the Qur’an and revelation, and capable of carrying this heavy burden.
This article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and i
... Show More