There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code …
This experiment was conducted at Poultry Research Station of the Animal Resources Research Department-Office Agricultural Research-Ministry of Agriculture in Iraq, during a period of 16 weeks (four periods and each period of four weeks) from 21 th April to 10 th August 2019. In this experiment 240 Japanese quail's female 9 weeks old, were used in this experiment. Females were randomly assigned to five treatments with three replicates per treatment (16 females/replicate). The experimental treatments were T1, T2, T3, T4 and T5 with an addition of Spirulina in an average of (0, 1, 2, 3, 4%) respectively in the diets of quail to study their effect on productive performance. The results of the experiment showed significant increase (P≤0.05) re
... Show MorePurpose :This study seeks to provide the point of view stands on the marketing performance of the banks in the context of Dynamic Equilibrium of marketing. It aims to develop a prototype of measuring marketing performance under the umbrella of marketing dynamic prototype, embodied of the strategic alliance and competition, and the laws and legislation, and to explore any of the dimensions more effective in achieving performance. This study aims to discusses the importance of the Dynamic Equilibrium of marketing and it role in achieving the marketing performance <
... Show MoreThe research dealt with the risks of reinsurance and its impact on the financial performance of the National Insurance Company by focusing on reinsurance in the marine insurance branch. Negative impact on the financial performance of the NICs and the Marine Insurance Branch. The research sample resulted in a main hypothesis that reflects this relationship. Lee in the analysis of financial information reports National Insurance Company of the branch of marine insurance for the period of 2010 until 2017, and the use of (retention) for measuring the re-insurance operations index, and (insurance financial surplus rate) to measure financial performance. For the purpose of obtaining the results, a number of statistical methods were used accord
... Show MoreThe objective of the research is to measure the impact of social responsibility on the financial performance of the National Bank of Iraq for the period from 2014 to 2016 (3 years) through discussing and analyzing the level of practice of the Bank of Baghdad for social responsibility and the impact on their financial performance during the period. To measure the independent variable (CSR), the researcher used the CSR Disclosure Index and relied on the ROA as an indicator to measure the dependent variable (financial performance). The results of the research showed the main hypothesis of the research, which states that the social responsibility of the banks has no significant impact on the financial performance. In relation to the disclosu
... Show MoreAs the prices of the fuel and power had fluctuated many times in the last decade and new policies appeared and signed by most of the world countries to eliminate global warming and environmental impact on the earth surface and humanity exciting, an urgent need appeared to develop the renewable energy harnessing technologies on the short-term and long-term and one of these promising technologies are the vertical axis wind turbines, and mostly the combined types. The purpose of the present work is to combine a cavity type Savonius with straight bladed Darrieus to eliminate the poor self-starting ability for Darrieus type and low performance for Savonius type and for this purpose, a three-bladed Darrieus type with symmetric
... Show MoreThis study aims to test whether the institutions listed on the Iraq Stock Exchange have a significant correlation between the level of conservative accounting practice with the level of market share returns during the Coronavirus pandemic period as one of the policies to confront the economic repercussions of the Coronavirus pandemic. Furthermore, the sample included institutions listed on the Iraq Stock Exchange during the 2019 and 2020 years, i.e., the period before the Coronavirus pandemic and during the Coronavirus pandemic for the purpose of comparison. The market value to book value model was used, and the study found that conservative institutions had achieved the highest level of market share prices compared to non-conservat
... Show MoreBackground: Poly-ether-ether-ketone(PEEK) has been introduced to many dental fields. Recently it was tested as a retainer wire‎ following orthodontic treatment. This study aimed to investigate the effect of changing the bonding spot size and location on the performance of PEEK retainer wires. Methods: A biomechanical study involving four three-dimensional finite element models was performed. The basic model was with a 0.8 mm cylindrical cross-section PEEK wire, bonded at the center of the lingual surface of the mandibular incisors with 4 mm in diameter composite spots. Two other models were designed with 3 mm and 5 mm composite sizes. The last model was created with the composite bonding spot of the canine away from the center of t
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance