Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …
The designer must find the optimum match between the object's technical and economic needs and the performance and production requirements of the various material options when choosing material for an engineering application. This study proposes an integrated (hybrid) strategy for selecting the optimal material for an engineering design depending on design requirements. The primary objective is to determine the best candidate material for the drone wings based on Ashby's performance indices and then rank the result using a grey relational technique with the entropy weight method. Aluminum alloys, titanium alloys, composites, and wood have been suggested as suitable materials for manufacturing drone wings. The requirement
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show Moreإن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى
... Show MoreThe security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.
Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
This research is carried out to study the effect of the external post-tensioning technique on the flexural capacity of simply supported composite castellated beam experimentally. In this research, seven composite castellated beams having the same dimensions and material properties were cast and tested up to failure by applied two concentrated loads at 700 mm from each end. Two external strands of 12.7 mm diameter were fixed at each side of the web of strengthening beams and located at depth 180 mm from top fiber of the section (dps) at each end of the beam. The strands have been tensioned by using a hydraulic jack with a constant stress of 100 MPa. This research aims to study the effect of the strengthening by different shapes of st
... Show MoreBackground: A minimally invasive antral membrane balloon elevation (MIAMBE) has been introduced to overcome the invasiveness of modified Caldwell-Luc (lateral approach) and the drawbacks of the osteotome (summers' technique) in maxillary sinus floor elevation surgery. Materials and methods: A total of 13 adult Iraqi patients aged 28-55 years, 4 males and 9 females underwent sinus floor elevation surgery via crestal approach by using sinus balloon technique. A panoramic radiograph and (Cone beam computed tomography (CBCT)/or medical CT scan) were obtained before and after surgery. Postoperative gained bone was assessed and the patient reactions including pain, nasal bleeding, and ecchymosis were recorded. The whole follow up period was 1yea
... Show More