A modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
Conclusion The observation of the phenomenon of structural evolution of the international system and its instability on a particular situation, by its transition from unipolar to polarity to bipolarism and then to unilateralism in the early 1990s led by the United States, and to the present moment, To say that the structure by which the hierarchy of superpowers or the regime is directed in terms of its various capacities that qualify it, and with the consent of the rest of the States directing the regime to lead and lead the world's first place, has no direct relation to the stability of this system, I hope other more influential in its stability. The structure of the new international order will be completely different in terms of the r
... Show MoreThe present paper focuses on the nature of the different interactions between cometary nucleus and tail with solar wind. The dynamics of the comet will impose many features that provide unique behavior of the comet when entering the solar system. These features are reviewed in this paper and few investigations are made. The calculations made in this work represent the analysis and interpretation of the different features of the comet, such as perihelion and eccentricity dependence on the gas production rate, and the dependence of the latter on the composition of the comet nucleus. The dependences of the heliocentric, bow shock, contact surface, and stand-off distances with gas production rate for many types of comets that cover linear and n
... Show MoreIntrinsic viscosities have been studied for polyethylene oxide in water which has wide industrial applications. The polyethylene oxide samples had two different structures, the first one was linear and covers a wide range of molecular weight of 1, 3, 10, 20, 35, 99, 370, 1100, 4600, and 8000 kg/mol and the second one was branched and had molecular weights of 0.55 and 40 kg/mol.
Intrinsic viscosities and Huggins constants have been determined for all types and molecular weights mentioned above at 25ºC using a capillary viscometer. The values of Mark-Houwink parameters (K and a) were equal to 0.0068 ml/g and 0.67 respectively, and have not been published for this range of molecular weight in as yet.
This paper deals with constructing mixed probability distribution from mixing exponential
A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show More