Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps have been computed numerically. Increasing the dynamical behavior of the system by using more complex chaotic maps leads to inferiority in the overall system performance. So, in this work, the BER performance for the dual and single chaotic maps by exploiting the benefits of a hybrid Chaos Shift Keying-Multiple-Input-Multiple-Output (CSK-MIMO) communication system has been investigated. The results show that the dual tent map has more randomness, whereas the single logistic map has the least randomness. As well as the CSK-MIMO gives an outstanding BER performance when it compared with the SISO system which helps in reducing the system’s inferiority.
The organizational culture is an effective control mechanism that dictates the behavior of employees and according to their intellectual and social orientations, so it is considered a more powerful way to control employee orientations and determine their management according to organizational rules and regulations, as it was one of the most important factors determining the performance of organizations, while organizational performance is a measure of what the organization has achieved from the objectives of the scheme To ensure that it faces various changes and remains within the global competition, and to reach that it was necessary to identify the most prominent and most important research problems in knowing the extent of com
... Show MoreThe study consisted in the development and use of a practical method to detect and
monitor, analyze and produce maps of changes in land use and land cover in the district of
Mahmudiya in Baghdad during the period 1990-2007 using the applications of remote sensing
techniques and with the assisstant of geographic information systems (GIS),as a valuable
contribution to land degradation studies.
This study is based maiuly on the processing on two subsets of landsat5 TM images picked up
in August 1990 and 2007 respectively in order to facilitate comparision and were thengeometrically and radiometrcally calibrated ,to used for digital classification purposes using
maximum liklihoods classification or six spectral bands of
The reclamation of makeup water is studied in terms of breakthrough time (i.e., the leakage of the cations). Makeup water was subjected to lab-scale ion exchangers of two types: strong acid cation and weak base anion exchanger. The experimental investigation was directed to study the ion exchanger performance in terms of four different parameters (i.e., copper concentration, total dissolved solids (TDS), feed rate and bed depth). Box-Wilson composite rotatable design was adopted in designing the experiments. Breakthrough times of the effluent stream are measured in terms of copper concentration of 2 to 25 ppm, TDS concentration of 250 to 1250 ppm, feed rate of 0.38 to 5.34 l/h and bed depth of 5 to 70 cm. Simulation the effect of the stu
... Show MoreThe research deals with a new type of high-performance concrete with improved physical properties, which was prepared by using metal additives minutes (Metakaolin) and by studing their impact on the properties of mortar and concrete high-performance through destructive and non destructive tests. This type of concrete is used broadly in public buildings and in other structures . The research involved a number of experiments such as finding the activity index of burned at a temperature of 750 º C according to the standard ( ASTM C-311/03), as well as casting models for the cubic mortar mixtures and concrete containers at different rates of metakaolin ranging between (5% - 20%) as an added part to the cement mix to get a high- compressive
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show More