Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps have been computed numerically. Increasing the dynamical behavior of the system by using more complex chaotic maps leads to inferiority in the overall system performance. So, in this work, the BER performance for the dual and single chaotic maps by exploiting the benefits of a hybrid Chaos Shift Keying-Multiple-Input-Multiple-Output (CSK-MIMO) communication system has been investigated. The results show that the dual tent map has more randomness, whereas the single logistic map has the least randomness. As well as the CSK-MIMO gives an outstanding BER performance when it compared with the SISO system which helps in reducing the system’s inferiority.
تعد المحاسبة بشكل عام علماً لكنها ليست من العلوم الصرفة وإنما من العلوم الإجتماعية مما يتطلب للتعامل مع المواضيع المحاسبية الأخذ بنظر الاعتبار الأشخاص المعنيين بالموضوع سواء كانوا المعدين للمخرجات المحاسبية أي المحاسبين، أو الاطراف ذوي المصالح المعنيين والمستفيدين من هذه المخرجات أي المستخدمين، ويعد المحاسب جزءاً من العملية الاجرائية نفسها وبهذا يكون دوره مزدوجاً يجمع بين كونه القائم بالبحث والقي
... Show MoreFading channel modeling is generally defined as the variation of the attenuation of a signal with various variables. Time, geographical position, and radio frequency which is included. Fading is often modeled as a random process. Thus, a fading channel is a communication channel that experiences fading. In this paper, the proposed system presents a new design and simulate a wireless channel using Rayleigh channels. Rayleigh channels using two approaches (flat and frequency-selective fading channels) in order to calculate some path space loss efforts and analysis the performance of different wireless fading channel modeling. The results show that the bite error rate (BER) performance is dramatically improved in the value of signal to
... Show MoreThis study was done to investigate the impact of different nanoparticles on diesel fuel characteristics, Iraqi diesel fuel was supplied from al-Dura refinery and was treated to enhance performance by improving its characteristics. Two types of nanoparticles were mixed with Iraqi diesel fuel at various weight fractions of 30, 60, 90, and 120 ppm. The diesel engine was tested and run at a constant speed of 1600 rpm to examine and evaluate the engine's performance and determine emissions. In general, ZnO additives' performance analysis showed they are more efficient for diesel fuel engines than CeO. The performance of engine diesel fuel tests showed that the weight fraction of nanoparticles at 90 and 120 ppm give a similar performance,
... Show MoreThis study was done to investigate the impact of different nanoparticles on diesel fuel characteristics, Iraqi diesel fuel was supplied from al-Dura refinery and was treated to enhance performance by improving its characteristics. Two types of nanoparticles were mixed with Iraqi diesel fuel at various weight fractions of 30, 60, 90, and 120 ppm. The diesel engine was tested and run at a constant speed of 1600 rpm to examine and evaluate the engine's performance and determine emissions. In general, ZnO additives' performance analysis showed they are more efficient for diesel fuel engines than CeO. The performance of engine diesel fuel tests showed that the weight fraction of nanoparticles at 90 and 120 ppm give a similar
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreSloped solar chimney system is a solar chimney power plant with a sloped collector. Practically, the sloped collector can function as a chimney, then the chimney height can be reduced and the construction cost would be reduced.The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady, turbulent standard model with Boussiuesq approximation to develop for the sloped solar chimney system in this study and evaluate the performance of solar chimney power plant in Baghdad city of Iraq numerically by Fluent (14) software with orking conditions such as solar radiation intensity (30
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe electrochemical behavior of carbon steel in water sweetening station in Libya has been studied in the range of ( 293–333 oC) using weight loss technique. Measurements were carried out over a range of Reynolds number (5000 – 25000).An apparatus was designed for studying the corrosion process in the turbulent regime, which is of industrial significance. It was found that The corrosion rate of carbon steel in water sweetening station is under diffusion control and increases with increasing Reynolds number. On the other hand the variation of corrosion rate with temperature in the range of (293–333 oC) was found to follow Arrhenius equation and the activation energy approximately the same except at low Reynolds
... Show More