There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code …
The aim of this research is to examine the relationship between entrepreneurial mindset and aspiration and small business performance Baghdad, Iraq. This study proposed a quantitative analysis in which entrepreneurial mindset and aspiration is a critical success factor of small business in Iraq. The method employed in the collection of data was by the means of self-administered questionnaire which was filled and completed by small business owners randomly selected from a sampling frame of registered small businesses. The questionnaire was adapted from the study of Davis, Halls & Mayer (2015) and Abdel-Maksoud, Asada & Nakagawa (2008) which was used to measure entrepreneurial mindset and aspiration using a ten items scale and small business
... Show MoreThis work presents the construction of a test apparatus for air-conditioning application that is flexible in changing a scaled down adsorbent bed modules. To improve the heat and mass transfer performance of the adsorbent bed, a finned-tube of the adsorbent bed heat exchanger was used. The results show that the specific cooling power (SCP) and the coefficient of performance (COP) are 163 W/kg and 0.16, respectively, when the cycle time is 40 min, the hot water temperature is 90oC, the cooling water temperature is 30oC and the evaporative water temperature is 11.4oC.
Toxic substances have been released into water supplies in recent decades because of fast industrialization and population growth. Fenton electrochemical process has been addressed to treat wastewater which is very popular because of its high efficiency and straightforward design. One of the advanced oxidation processes (AOPs) is electro-Fenton (EF) process, and electrode material significantly affects its performance. Nickel foam was chosen as the source of electro-generated hydrogen peroxide (H2O2) due to its good characteristics. In the present study, the main goals were to explore the effects of operation parameters (FeSO4 concentration, current density, and electrolysis time) on the catalytic performance that was optimized by r
... Show MoreThe ejector refrigeration system is a desirable choice to reduce energy consumption. A Computational Fluid Dynamics CFD simulation using the ANSYS package was performed to investigate the flow inside the ejector and determine the performance of a small-scale steam ejector. The experimental results showed that at the nozzle throat diameter of 2.6 mm and the evaporator temperature of 10oC, increasing boiler temperature from 110oC to 140oC decreases the entrainment ratio by 66.25%. At the boiler temperature of 120oC, increasing the evaporator temperature from 7.5 to 15 oC increases the entrainment ratio by 65.57%. While at the boiler temperature of 120oC and
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreAbstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreCost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles