Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps have been computed numerically. Increasing the dynamical behavior of the system by using more complex chaotic maps leads to inferiority in the overall system performance. So, in this work, the BER performance for the dual and single chaotic maps by exploiting the benefits of a hybrid Chaos Shift Keying-Multiple-Input-Multiple-Output (CSK-MIMO) communication system has been investigated. The results show that the dual tent map has more randomness, whereas the single logistic map has the least randomness. As well as the CSK-MIMO gives an outstanding BER performance when it compared with the SISO system which helps in reducing the system’s inferiority.
ABSTRACT Background: Piezosurgery device is a system developed recently to overcome the limitation of the traditional surgical technique in implant site preparation, which use the principle of ultrasonic microvibrations to create precise & selective cut in bone in harmony with the surrounding tissues. The aim of this study was to evaluate the outcomes of implants inserted by ultrasonic implant site preparation protocol (UISP) using piezosurgery device, regarding the survival rate, stability and other related factors, at 16 weeks postoperative follow up period. Materials and Methods: A total of (24) patients, (6) males and (18) females, aged between (19-51) years old, contributed in this study receiving a total of (42) implants, all of these
... Show MoreUrinary Schistosomiasis is one of important diseases that cause irritation and damage of urinary tract and other systems and tissues and can not be expected by doctors when diagnosing urinary tract diseases.The current study is conducted to investigate the prevalence of schistosomiasisin Baghdad / Al-Rusafa. 191urine samples were collected fromresidents ofsome areas of Al-Rusafain Baghdad governarate (Almashtal, Albaladyat, Alameen, Baghdad aljadida and Alnahrawan) for the period from March until the end of September 2010.The samples were examined by the precipitation and examination of micro hematuria by reagent strips. The total infection percentage was 9.42% (18/191) and was significantly higher in males compared tofemales12.64% (11/87)
... Show MoreWe have investigated the photoemission and electronic properties at the PTCDI molecules interface on TiO2 and ZnO semiconductor by means of charge transition. A simple donor acceptor scenario used to calculate the rate for electron transfer of delocalized electronics in a non-degenerately TiO2 and ZnO electrodes to redox localized acceptors in an electrolytic. The dependent of electronic transition rate on the potential at contact of PTCDI with TiO2 and ZnO semiconductors, it has been discussion using TiO2 and ZnO electrodes in aqueous solutions. The charge transfer rate is determining by the overlapping electronic coupling to the TiO2 and ZnO electrodes, the transition energy, potential and polarity media within the theoretical scenario of
... Show MoreA3D geological model was constructed for Al-Sadi reservoir/ Halfaya Oil Field which is discovered in 1976 and located 35 km from Amara city, southern of Iraq towards the Iraqi/ Iranian borders.
Petrel 2014 was used to build the geological model. This model was created depending on the available information about the reservoir under study such as 2D seismic map, top and bottom of wells, geological data & well log analysis (CPI). However, the reservoir was sub-divided into 132x117x80 grid cells in the X, Y&Z directions respectively, in order to well represent the entire Al-Sadi reservoir.
Well log interpretation (CPI) and core data for the existing 6 wells were the basis of the petrophysical model (
... Show MoreThis research is considered a simple attempt and effort which is it first and last target is to point at the procedures of the taxes account that aims to reduce the taxes from the persons and give free to the person who estimates the tax to practice what comes from the competent authorities to describe the person who estimates the tax and not an accountant who practice the accountant procedures which are imposed on him by the annual terms from higher administrations , So he can not evaluate state of the person who pay the tax , and he might be dissatisfied with his job , because his role can’t be activated from the general foundation taxes.
And so , this research includes four fields:-
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More