In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
Nonlinear time series analysis is one of the most complex problems ; especially the nonlinear autoregressive with exogenous variable (NARX) .Then ; the problem of model identification and the correct orders determination considered the most important problem in the analysis of time series . In this paper , we proposed splines estimation method for model identification , then we used three criterions for the correct orders determination. Where ; proposed method used to estimate the additive splines for model identification , And the rank determination depends on the additive property to avoid the problem of curse dimensionally . The proposed method is one of the nonparametric methods , and the simulation results give a
... Show MoreThe research (Anthropology and Representations of magic in Arab Theatrical Text, Harut and Marut's play as a Model) is concerned with studying magic and the forms of its presence in the theatrical text in different human cultures where it belongs. The research consists of four chapters.
The first chapter includes the research problem that revolves around the following questions: (what is the mechanism of employing magic anthropology and its representations in the Arab theatrical text Harut and Marut's play as a model?), and the research importance which is attributed to the necessity of studying (magic) in the Arab theatrical text as it is considered the inauguration of one of the social phenomena that many researchers in the field o
One of the globalization results is (VAT) , so it is important to consider its results and impact on the tax system.
The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.
The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.
The history of (VAT)was also studied mentiorned and studied.
As a conclusion (VAT) is one of the m
... Show MoreThe actor has mechanisms that were applied in the performance، as it formed a style in the theatrical form (weird)، and the researcher deliberately studied these mechanisms and divided them into four chapters.
The researcher divided it into two sections، the first is the actor's performance requirements، and the second is the boring performance methods in the directors' theater، and then the researcher concluded the second chapter with the most important indicators.
As for the third chapter، the researcher determined the society of his research and the method of selecting the sample (strange) and analyzing the sample and concluded with the most important results of the sample analysis.
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.
First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .
&nbs
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More