There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (AWGN) and channels disturbed by Rayleigh fading. Both the inherently wideband DCSK modulation and the space-time block code (STBC) are techniques that …
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreExperimental tests were conducted to study the behavior of skirted foundations rested on dry medium sandy soil subjected to vertical and inclined loads. To achieve this goal, a small-scale physical model was designed and performed which contained an aluminum circular footing (100 mm) in diameter and (10 mm) in thickness and skirts with different heights, local medium poorly graded dry sand is placed in a steel soil container (2 mm) thick with internal dimensions (1000 mm x 1000 mm in cross section and 800 mm in height). The main objective of this study was to evaluate the response of skirt attached to the foundation at different skirt (L/D) ratios (0.0, 0.5, 1.0 and 1.5) and is subjected to point load at different angles of inclinat
... Show MoreConcrete pavements are essential to modern infrastructure, but their low tensile and flexural strengths can cause cracking and shrinkage. This study evaluates fiber reinforcement with steel and carbon fibers in various combinations to improve rigid pavement performance. Six concrete mixes were tested: a control mix with no fiber, a mix with 1% steel fiber (SF1%), a mix with 1% carbon fiber (CF1%), and three hybrid mixes with 1% fiber content: 0.75% steel /0.25% carbon fiber (SF0.75CF0.25), 0.25% steel /0.75% carbon fiber (SF0.25CF0.75), and 0.5% steel /0.5% carbon fiber ((SF0.5CF0.5). Laboratory experiments including compressive, flexural, and splitting tensile strength tests were conducted at 7, 28, and 90 days, while Finite Element Analys
... Show MoreIn this study, industrial fiber and polymer mixtures were used for high-speed impact (ballistic) applications where the effects of polymer (epoxy), polymeric
mixture (epoxy + unsaturated polyester), synthetic rubber (polyurethane), Kevlar fiber, polyethylene fiber (ultra High molecular weight) and carbon fiber.
Four successive systems of samples were prepared. the first system component made of (epoxy and 2% graphene and 20 layer of fiber), then ballistic test was
applied, the sample was successful in the test from a distance of 7 m. or more than, by using a pistol personally Glock, Caliber of 9 * 19 mm. The second
system was consisting of (epoxy, 2% graphene, 36 layers of fiber and one layer of hard rubber), it was succeeded
Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreIn this work, wide band range photo detector operating in UV, Visible and IR was fabricated using carbon nanotubes (MWCNTs, SWCNTs) decorated with silver nanoparticles (Ag NPs). Silicon was used as a substrate to deposited CNTs/Ag NPs by the drop casting technique. Polyamide nylon polymer was used to coat CNTs/Ag NPs to enhance the photo-response of the detector. The electro-exploding wire technology was used to synthesize Ag NPs. Good dispersion of silver NPs achieved by a simple chemistry process on the surface of CNTs. The optical, structure and electrical characteristic of CNTs decorated with Ag NPs were characterized by X-Ray diffraction and Field Emission Scanning Electron Microscopy. X-ray diffra
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More