There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (AWGN) and channels disturbed by Rayleigh fading. Both the inherently wideband DCSK modulation and the space-time block code (STBC) are techniques that …
Abstract: Polarization beam splitter (PBS) integrated waveguides are the key components in the receiver of quantum key distribution (QKD) systems. Their function is to analyze the polarization of polarized light and separate the transverse-electric (TE) and transverse-magnetic (TM) polarizations into different waveguides. In this paper, a performance study of polarization beam splitters based on horizontal slot waveguide has been investigated for a wavelength of . PBS based on horizontal slot waveguide structure shows a polarization extinction ratio for quasi-TE and quasi-TM modes larger than with insertion loss below and a bandwidth of . Also, the fabrication tolerance of the structure is analyzed.<
... Show MoreVerbal Communication is linked with the social event no matter how different Communities in their cultures and styles of living and it's intuitions and political systems remain involved in its need . It is a dialogue , a pillar of human Communication , all Communication process conditional on the where a bouts of the shrine and the cycle of words . Semiotics is based on two principles important to Communicate : one : offer intended to report to the speaker . And the other : The recipient of the message a (know led gment of this intent . And learn to measure intent rely on two types of units ; first is the evidence for which is available for reporting the intent and the other : Signals . semiotics Communicate evidence bother as a channel
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Frequently, load associated mode of failure, rutting and fatigue, are the main failure types found in some newly constructed roads within Baghdad, the capital of Iraq, and some suburban areas. The use of excessive amount of natural sand in asphalt concrete mixes which is attractive to local contractors could be one of the possible causes to the lack of strength properties of the mixes resulting in frustration in the pavement performance. In this study, the performance properties of asphalt concrete mixes with two natural sand types, desert and river sands, were evaluated. Moreover, five replacement rates of 0, 25, 50, 75, and 100% by weight of the fine aggregate finer than 4.75 were used. The performance properties including moisture susc
... Show MoreThe main objective of this study is to develop predictive models using SPSS software (version 18) for Marshall Test results of asphalt mixtures compacted by Hammer, Gyratory, and Roller compaction. Bulk density of (2.351) gm/cc, at OAC of (4.7) % was obtained as a benchmark after using Marshall Compactor as laboratory compactive effort with 75-blows. Same density was achieved by Roller and Gyratory Compactors using its mix designed methods.
A total of (75) specimens, for Marshall, Gyratory, and Roller Compactors have been prepared, based on OAC of (4.7) % with an additional asphalt contents of more and less than (0.5) % from the optimum value. All specimens have been subjected to Marshall Test. Mathematical model
... Show More