There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed for protecting information integrity when data is being transferred over a harsh communication medium. Hence, a separate channel coding protocol is often
The research aims to investigate the relationship and impact of e-governance as an independent variable in achieving creative performance as a dependent variable. These variables have been studied in the Directorate of Passports Affairs, and seek to come up with a set of recommendations that help in promoting e-governance in the researched organization, and the researcher adopted the descriptive-analytical approach, included The sample (122) of the total (194) individuals distributed in several administrative levels (officers, associates, and administrative staff). By adopting the questionnaire, which included (49) paragraphs as the main tool for the collection of data and information, as well as personal interviews and field obs
... Show MoreThis research was designed to study effect of performance appraisal dimensions on organizational confidence.
Asset completion questionnaire was used to collect data of this research from a random simple represent forty employees who works in Iraqi Oil ministry. The main result of this research was positive relations and the effect between performance appraisal and organizational confidence. The research contains some conclusions, the main of it is unimplemented the performance appraisal results in the policies of employees in the ministry and it work in classic methods incentives and training.
The important recommendations must doing to achieve integrating between the result of pe
... Show MoreAbstract
The research aims to shed light on the extent to which the practices of performance management in achieving organizational excellence in one of the formations and the Ministry of Finance (GCT). The importance of the selection of these organizations is that they occupies a large and exceptional importance in the national economy through income redistribution add it to cover a large part of the state budget revenues, these organizations possess functionally diverse cadre of them pregnant initial certification and other senior and he fairly stable To meet this target, and on the basis of the data search exploratory researcher built model hypothesis for the search included variable impressionist and
... Show MoreThe research Aim is to provide support to small enterprises by providing tools that enable measurement and test their performance and identifying weaknesses and work on them is determined by the problem of searching using traditional assessment methods for small projects with only financial performance measurement standards that do not provide a complete picture of the performance of these projects so use the balanced scorecard the four pillars (financial, customer, learning and growth, and internal processes) and identify deviations and work on them through the use of the outputs of the programme (probe), PROmoting Business Excellence-PROBE), which It is a model of performance evaluation, with which you can deve
... Show MoreElectromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe art of batik is one of the ancient arts that has a long history in East Asian countries, especially in Indonesia, where it was considered a traditional craft with which many Indonesian tribes lived. This art began to move to other continents and develops and progresses due to the artist’s connection to the surrounding technological and intellectual development, as art became more outgoing and liberated, it helped the artist to create and innovate in his designs. In this research, he focuses on modern performance methods through which print paintings can be produced through design elements, especially calligraphy, to create aesthetic and creative effects in the productive work. The current research aims to identify the various perfo
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.