There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (AWGN) and channels disturbed by Rayleigh fading. Both the inherently wideband DCSK modulation and the space-time block code (STBC) are techniques that …
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreThis study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the r
... Show MoreWere arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution to chose the suggested market to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms
... Show MoreAbstract: The aim of the current research is to find out the extent to which systems thinking skills are included in the mathematics textbook scheduled for the third intermediate grade for the academic year (2020-2021) by answering the main research question: What are the systems thinking skills included in the mathematics textbook for middle third grade? The analytical descriptive approach was used, and to achieve the goal of the research, a list of the main systemic thinking skills and sub-skills was prepared, and after analyzing the content of the mathematics textbook, the reliability of the analysis was verified through the analysis over time and through others, and it obtained a reliability rate of 98% us
... Show MoreThe Local manufacturing scanning gamma system designed in Tuwaitha site for nondestructive assay method of radioactive waste drums, where it consist of two main parts with their belongings for controlling the of detector and drum movements up-down and rotation respectively. The volume of the used drum is 220 L with 85 cm height. The drum filled with Portland cement. Six cylindrical holes were made within cement drum and distributed in radial arrangement.The152Eu source inserted in these holes individually, to measure the average angular count rate of gamma radiation. The full energy efficiency value for geometry of drum and detector is computed for thirteen photo peaks. The average efficiency represented by the curve of these peaks indic
... Show MoreIn the present work the clathrate hydrate dissociation enthalpies of refrigerant R134a+ water system, and R134a + water + salt system were determined. The heat of dissociation of three types of aqueous salts solutions of NaCl, KBr and NaF at three concentrations (0.09, 0.17and 0.26) mol·kg−1 for each salt type, were enthalpy measured. The Clapeyron equation was used tocalculate heat of dissociation of experimental data for binary and ternary system.In order to find the effect of compressibility factor on heat dissociation enthalpy, the study was conducted by using equation of state proposed by Peng and Robinson Stryjek-Vera (PRSV). The obtained results of dissociation enthalpy for binary system were (143.8) kJ.mol-1
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show More