There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThis paper aims to review the intellectual to the most important thought leaders administrative and strategic They both (Henry Fayol and Michelle Porter), who forward a lot of ideas that have helped countries in the advancement and progress their economies , has been drawing literature theoretical common border in Contributions ( Fayol ) philosophical and between applications ( Porter ), which reversed strategies of the three ( the leadership of the cost, differentiation, and focus ), so browse search how to apply and use the principles of Fayol in the implementation of strategies competitiveness of Porter, and stems from a problem ( ( to what extent a reflection of the principles ( Fayol) fourteen strategies (Porter ) competitiv
... Show MoreThis aims tackles the importance of the organizational energy of the hotel organizations that search the success in the business field to penetrate in the whole tourist markets, and to draw the policies and firm rules which must be framed with the administrative strategies that contributed in creativity and achievement the targets besides provide a future vision due to its position among the competitive henceforth achieving the activity. This is what the chapters tackle in the theoretical side. Also many general questions have been arisen to determinate the importance of the research and many other special questions that express the problem of the study. To limit the levels of study alter
... Show MoreTotal quality management is considered a modern management concept that achieved success in all fields of various industrial and service sectors in advanced countries . One of these sectors is insurance. This concept aims at improving and developing the performance of insurance service continually . It is the gate that can enable radical change in the organization culture inside the company to transform it from using the traditional management style into using the modern style which achieves high quality standard of insurance service . As a result many insurance companies headed to applying the principles of total quality management in their companies . This study aims at raising the standard of the performance of the Iraqi Insurance Com
... Show MoreBackground: The use of minerals in treatment of different diseases is as old as man himself. zinc is the most famous trace mineral related to male sexual function. Oligoasthenozoospermic subfertile patients were treated with zinc sulphate for three months.
Objectives: Aim of the research is to investigate the role of Zinc and if it affects the abnormalities of some semen parameters and to study the possible role of pharmaceutical preperations of zinc in amelioration of male subfertility as well as to assess the ability of Zinc to induce changes in the serum and semen zinc levels in addition to the levels of reproductive hormones (FSH and Testosterone).
Type of the study:
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show More