The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
The road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th
... Show MoreArtificial Neural Networks (ANN) is one of the important statistical methods that are widely used in a range of applications in various fields, which simulates the work of the human brain in terms of receiving a signal, processing data in a human cell and sending to the next cell. It is a system consisting of a number of modules (layers) linked together (input, hidden, output). A comparison was made between three types of neural networks (Feed Forward Neural Network (FFNN), Back propagation network (BPL), Recurrent Neural Network (RNN). he study found that the lowest false prediction rate was for the recurrentt network architecture and using the Data on graduate students at the College of Administration and Economics, Univer
... Show MoreThe physical and morphological characteristics of porous silicon (PS) synthesized via gas sensor was assessed by electrochemical etching for a Si wafer in diluted HF acid in water (1:4) at different etching times and different currents. The morphology for PS wafers by AFM show that the average pore diameter varies from 48.63 to 72.54 nm with increasing etching time from 5 to 15min and from 72.54 to 51.37nm with increasing current from 10 to 30 mA. From the study, it was found that the gas sensitivity of In2O3: CdO semiconductor, against NO2 gas, directly correlated to the nanoparticles size, and its sensitivity increases with increasing operating temperature.
Thin films of vanadium oxide nanoparticles doped with different concentrations of europium oxide (2, 4, 6, and 8) wt % are deposited on glass and Si substrates with orientation (111) utilizing by pulsed laser deposition technique using Nd:YAG laser that has a wavelength of 1064 nm, average frequency of 6 Hz and pulse duration of 10 ns. The films were annealed in air at 300 °C for two hours, then the structural, morphological and optical properties are characterized using x-ray diffraction (XRD), Field emission scanning electron microscopy (FESEM) and UV-Vis spectroscopy respectively. The X-ray diffraction results of V2O5:Eu2O3 exhibit that the film has apolycrystalline monoclinic V2O5 and triclinic V4O7 phases. The FESEM image shows a h
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.