Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreImage retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud
... Show MoreAppeared in the light of globalization growing convergence of the distances between the countries in world, this convergence is causing mixing of cultures to become culture is a universal one culture, There are positives and negatives of this mixing and mingling of cultures, consider Loss of cultural identity is one of the biggest negatives the Arab cultural infrastructure in general and Iraq in special. In addition consider subject to not keep the cultural identity is the most important Arab issues and dangerous to our Arab identity in various fields, including design and architecture, highlights here the subject of research on the impact of globalization on the identity of the interior spaces, cafés of Baghdadi, one of the historical
... Show MoreIn this paper new methods were presented based on technique of differences which is the difference- based modified jackknifed generalized ridge regression estimator(DMJGR) and difference-based generalized jackknifed ridge regression estimator(DGJR), in estimating the parameters of linear part of the partially linear model. As for the nonlinear part represented by the nonparametric function, it was estimated using Nadaraya Watson smoother. The partially linear model was compared using these proposed methods with other estimators based on differencing technique through the MSE comparison criterion in simulation study.
The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn this paper, an experimental study has been conducted regarding the indication of resonance in chaotic semiconductor laser. Resonant perturbations are effective for harnessing nonlinear oscillators for various applications such as inducing chaos and controlling chaos. Interesting results have been obtained regarding to the effect of the chaotic resonance by adding the frequency on the systems. The frequency changes nonlinear dynamical system through a critical value, there is a transition from a periodic attractor to a strange attractor. The amplitude has a very relevant impact on the system, resulting in an optimal resonance response for appropriate values related to correlation time. The chaotic system becomes regular under
... Show MoreCloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreThe world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show More