There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreThe present search aims to develop a test for selective attention, cognitive load and thinking mistakes and measuring these concepts among Baghdad university students. To make a comparison between the selective attention, cognitive load, and the mistakes of thinking among students in term of gender. To identify the relationship among the selective attention, cognitive load and the mistakes of thinking of university students. To achieve these purposes, the searcher has developed a test for selective attention, cognitive load, and the mistakes of thinking. Then, these tools were applied to a sample of (200) university students were selected from (21) college. The researcher used t-test of one sample, t-test of two independent
... Show More
Abstract
Personality is one of the most important elements that should be developed in university student. Thus, we have to develop the positive traits and neutralize the negative traits of students as well as we have to pay attention to the level of student achievement at the same time, the researcher designed a scale to measure the traits of study sample. The research come out with a number of recommendations and proposals, the most important of which Enhancing the positive characteristics of university students in order to reach them to the level of mature personality with mental health. Enhancing the positive role of the high level of achievement by motivating the stude
... Show MoreThe aim of the current study is to in evaluate the role of SOD activity in the previously reported oxidative stress in our laboratory(1), in the patients with different brain tumors. SOD activity was assayed according to riboflavin/NBT method and its specific activity was calculated in patients with benign and malignant brain tumors and control. Moreover the specific activity was compared in these samples according to gender and the occurrence of disease.Non significant elevation (P > 0.05) in SOD specific activity was observed in tissue of malignant tumors in comparison to that of in benign brain tumors. While a highly significant decrease (P < 0.001) of the specific activity was found in sera of malignant patients group in comparison to t
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreObjective: to assess the Nursing College students' health-protective behaviors (HPBs) and their
association with some sociodemograghic characteristics.
Methodology: A sample of 100 Students (males and females) was selected through a systematic
random sample that were at the third and fourth year of Nursing College in Baghdad University for the
period of April 1st through April 30th 2007. Data were collected through the use of a self-report
instrument that used for Americans as HPBs assessment that contains 23 items. Reliability and validity
of the tool were determined through a pilot study. A descriptive statistical approach (frequencies and
percentages) and inferential statistical approach (chi-square) were used for
Various speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show More