Among the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS
... Show MoreBackground : Shoulder pain is a common problem that can pose difficult diagnostic and therapeutic challenges for the family physician It is the third most common musculoskeletal complaint in the general population, and account for 5% of all general practitioners musculoskeletal consults Objective: To determine the diagnostic performance of ultrasonography compared with the physical examination for detection of rotator cuff tears in painful shoulder syndrome. Method: Prospective study was done on seventy patients (48 male, 22 female), age ranged between 30-70 years (mean age 50 years), From February 2007 to July 2011, were subjected to comparative study in Al-Kindy teaching hospital with rotator cuff tears, including physical and ultrasonogr
... Show MoreThe shoulder and hip joints though essentially both are ball and socket joints, show structural variability to serve functional needs.
This study aims at revealing some of the structural and functional properties of each of the two joints regarding the factors that contribute to the stability of any joint in the body, namely: bone, ligament, and muscle.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More
We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD)
... Show MoreWe have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD) to estimate the parameters an
... Show MoreRe-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c