There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (AWGN) and channels disturbed by Rayleigh fading. Both the inherently wideband DCSK modulation and the space-time block code (STBC) are techniques that …
A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
In the present study, the effect of new cross-section fin geometries on overall thermal/fluid performance had been investigated. The cross-section included the base original geometry of (triangular, square, circular, and elliptical pin fins) by adding exterior extra fins along the sides of the origin fins. The present extra fins include rectangular extra fin of 2 mm (height) and 4 mm (width) and triangular extra fin of 2 mm (base) 4 mm (height). The use of entropy generation minimization method (EGM) allows the combined effect of thermal resistance and pressure drop to be assessed through the simultaneous interaction with the heat sink. A general dimensionless expression for the entropy generation rate is obtained by con
... Show MoreFusion can be described as the process of integrating information resulting from the collection of two or more images from different sources to form a single integrated image. This image will be more productive, informative, descriptive and qualitative as compared to original input images or individual images. Fusion technology in medical images is useful for the purpose of diagnosing disease and robot surgery for physicians. This paper describes different techniques for the fusion of medical images and their quality studies based on quantitative statistical analysis by studying the statistical characteristics of the image targets in the region of the edges and studying the differences between the classes in the image and the calculation
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreAs smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf
... Show MoreThe present study aims at knowing the effect of discussion method for students of fifth grade in preparatory school.
Methodology of the Study:
In order to achieve the objective of the study, the researcher chooses non-randomly the preparatory school affiliated to the District Chamchamal \ Suliemnaniya. The sample attained 64 students in 32 per group (control and experimental) groups. The researcher used the discussion method which was applied on experimental group. She uses the traditional method on the control group.
The researcher matched the two group in ago, intelligence, marks at the Kurdish Language in the previous year , pretest and posts for the indepe
... Show MoreImage contrast enhancement methods have been a topic of interest in digital image processing for various applications like satellite imaging, recognition, medical imaging, and stereo vision. This paper studies the technique for image enhancement utilizing Adaptive Histogram Equalization and Weighted Gamma Correction to cater radiometric condition and illumination variations of stereo image pairs. In the proposed method, the stereo pair images are segmented together with weighted distribution into sub-histograms supported with Histogram Equalization (HE) mapping or gamma correction and guided filtering. The experimental result shows the experimented techniques outperform compare with the original image in ev
... Show MoreAim of the research is the study of improving the performance of the thermal station south Baghdad and the main reasons for reduced its efficiency. South Baghdad power planet comprises (6) steam turbine units and (18) gas turbine units .The gas turbine units are composed of two groups: the first group is made up of gas units (1,2), each of capacity (123) MW. The design efficiency of gas turbine units is 32%. The actual efficiency data of steam units is 18.3% instead of 45% which is the design efficiency. The main reason for efficiency reduction of gas units is the rejected thermal energy with the exhaust gases to atmosphere, that are (450-510) ℃.The bad type of fuel used (heavy) fuel. Another reason for the low efficiency and has a neg
... Show MoreThe research topic was chosen because of the importance of communication in organizations in general and the marketing process in particular. Without communication, the organization can not live and continue ,The problem of study diagnosis the reduction in sales in the company of plant oils in some its classes and weakness in differentiation and its reputation at market in spit if having good products with standardized features And lack of customer communication channels, also the company does not have any whole view about the concept of marketing communication, Therefore, This sudy aimed ro define to know the type of relationship between the extent of the impact of the integrated marketing
... Show More