There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed for protecting information integrity when data is being transferred over a harsh communication medium. Hence, a separate channel coding protocol is often
The stress(Y) – strength(X) model reliability Bayesian estimation which defines life of a component with strength X and stress Y (the component fails if and only if at any time the applied stress is greater than its strength) has been studied, then the reliability; R=P(Y<X), can be considered as a measure of the component performance. In this paper, a Bayesian analysis has been considered for R when the two variables X and Y are independent Weibull random variables with common parameter α in order to study the effect of each of the two different scale parameters β and λ; respectively, using three different [weighted, quadratic and entropy] loss functions under two different prior functions [Gamma and extension of Jeffery
... Show MoreBackground: For various reasons, inguinal hernia repair under local anaesthesia is not well accepted to both patients and surgeons. The patients fear from pain and surgeons need full relaxation and co-operation to do successful hernia repairMethods: purpose of this study is to evaluate the effectiveness of local anaesthesia in inguinal hernia repair.prospective study was made from January 2011-0ctober 2013 , on a total of 50 patients with inguinal hernia operated on under local anaesthesia. Patients were selected primarily on the basis of their willingness to accept the procedure after the technique was described to them.Results: In this study 50 patient and 58 herniorrhaphies done for them during a period of about 34months were evaluate
... Show Morethis research five grammatical terminology, and predicate and ascribed to it and added and genitive, examined scientific accuracy envisaged in placed and how they conform to the content then proposed five alternative terminology, and proved that this alternative terminology reflects more accurately the content of conventional terminology in Arabic grammar lesson, logical approach relies on analysis of morphological derivation of the term and its language, and recommended research to pursue critical studies in grammatical terminology, because such research has Significant impact in removing the grammatical ambiguity of some scholars, as well as instrumental in the development of methods of teaching Arabic grammar, to return to the relatio
... Show Moreتنتاب العلاقةَ الأمريكية الإيرانية تجاذباتٌ ومشاحنات أدخلت العالم في حالة من الغموض السياسي، وجعلت بعض المراقبين والمحللين السياسيين لا يستبعدون توجيه الولايات المتحدة الأمريكية أو إسرائيل ضربة عسكرية لإيران، إذ يرى المدقق في واقع تلك العلاقة المضطربة: أن الأمور كلما بلغت حافة الهاوية عادت من جديد إلى ساحة الحوار والمفاوضات، ويبدو: أن الإستراتيجية الأمريكية التي يتبعها الرئيس (باراك أو
... Show MoreVirtual reality technology is the science of the embodiment of things and move spontaneously among non-real from one place to another with the full sense of the form, touch, sound, enables the user tried out and deal with it, like a real natural world and open up new worlds for human ambitious to let him overlooks the supposed world. Internet has become part of our daily lives, especially with the presence of mobile devices; that revolutionized the world of social networking. Access to information and build relationships change in the era of digital technology. The woman is not in isolation from this era; she found to herself a wide area for the production of ideas.
When we talk about woman in the modern means of communication, this a
The physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wi
... Show MoreThe development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreCopula modeling is widely used in modern statistics. The boundary bias problem is one of the problems faced when estimating by nonparametric methods, as kernel estimators are the most common in nonparametric estimation. In this paper, the copula density function was estimated using the probit transformation nonparametric method in order to get rid of the boundary bias problem that the kernel estimators suffer from. Using simulation for three nonparametric methods to estimate the copula density function and we proposed a new method that is better than the rest of the methods by five types of copulas with different sample sizes and different levels of correlation between the copula variables and the different parameters for the function. The
... Show More