Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …
Abstract
The changes that happened in the environment of business have great effects upon organizations with different activities specially the banks which requires the existence of an able opinion resources can adapt with the changes . Accordingly importance put upon intellectual capital which become one of the basic resources for organizations and one of success and growth elements with the availability of expertise , skills and capability of making essential changes in different process due to the presentation of innovations and creations of the to support banks activities .Therefore the intellectual capital represents the more r
... Show MoreSystems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different
... Show MoreBrachycerous Dipteran species on alfalfa plant Medicago sativa surveyed in several regions of Iraq from March to November 2012. The study was registered 14 species belonging to nine genera and four families. The results showed that Limnophra quaterna, Atherigona laevigata and Atherigona theodori as new records to Iraq and new pests of alfalfa.
DBN Rashid, Journal of Education College Wasit University 1(1):412-423, 2007
As computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the compute
It is believed that culture plays an important role in the ELF classroom activities (Al- Mutawa, & Kilani, 1989:87). It is important for the teacher to recognize potential negative (culturally based) perceptions of their learners. In Iraq, for instance, it is not. Uncommon to meet silent expressionless students that arc supposedly English language learners. It is possible for the beginner to interpret this negatively as a lack of interest in the study of English. This interpretation may play a harmful role in the classroom methodology. An instructor has to be intercultural competent to be an effective teacher. It will be more effective if the instructor adopts a consistent style of instruction to allow learners to adapt within the bounds of
... Show MoreThe main object of this paper is to study the representations of monomial groups and characters technique for representations of monomial groups. We refer to monomial groups by M-groups. Moreover we investigate the relation of monomial groups and solvable groups. Many applications have been given the symbol G e.g. group of order 297 is an M-group and solvable. For any group G, the factor group G/G? (G? is the derived subgroup of G) is an M-group in particular if G = Sn, SL(4,R).