There is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used a source of emitting light at the same time. This was done by using a reflecting microphone to reflect the incident laser beam to the receiver which was an photocell which connected to an audio amplifier. The emitting voice was clear without any type of noise with very high efficiency.
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More
The research aims to identify the magnitude of the impact of external debt on the gross domestic product in Morocco, and the importance of research lies in the role that external debt plays in addressing structural imbalances, if it is best disposed of according to well-studied economic plans by specialists in this regard, especially if these debts are directed with Other resources, as it helps pay the costs of these debts (debt servicing) that the external debt also raises the level of gross domestic product, and the research starts from the hypothesis that: There is an effect of foreign debt on the GDP in Morocco, has contributed in one way or another to The exacerbation of the external debt, which affected the m
... Show MoreWe studied, in this paper, the semiotics of the visual image of women in the discourse of empowerment, through three models of advertising images expressing the particularities of the Saudi Arabian environment.
We aim to know how the mark operates and how it is interpreted, as a semantic process in which the meaning ranges from description to interpretation, and we studied two hypotheses:
-The advertising image is a structure in which the mark corresponds to the reality and the discourse to the context.
-The significance is not found in the visual sign or in the textual sign of the advertising image, but in the creative event that opens up to the social, cultural, and psychological context, and creates a field of dia
... Show MoreThis paper aims to study the effects of the long term solar activity on the critical frequencies of ionospheric F1 layer over Baghdad city, during the solar cycle 22, within (1988- 1995). It is found that the critical frequency of this layer is closely related to the sunspots number during the years of the solar cycle 22, at a middle latitude region of the world. The study discussed the effect of sunspot numbers and solar events on the electron densities of F1 layer, which is the most important ionospheric parameter.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe improvement in Direction of Arrival (DOA) estimation when the received signals impinge on Active-Parasitic Antenna (APA) arrays will be studied in this work. An APA array consists of several active antennas; others are parasitic antennas. The responses to the received signals are measured at the loaded terminals of the active element. The terminals of the parasitic element are shorted. The effect of the received signals on the parasites, i.e., the induced short-circuit current, is mutually coupled to the active elements. Eigen decomposition of the covariance matrix of the measurements of the APA array generates a third subspace in addition to the traditional signal and noise subspaces generated by the all-active ante
... Show MoreIn this study, the results of the uranium concentrations and specific activity in 10 rice samples are described using a solid-state track detector (CR-39). Samples were collected from various local Iraqi markets with different origins (Iraq, India, America, and Thailand). Our findings found that the results of uranium concentration in all studied samples are ranging from (0.55 ± 0.28 to 1.74 ± 0.31) ppm with a weighted average of (1.24 ± 0.99) ppm. Also, results demonstrate that the specific activity values of the studied samples swing between values of (6.88 ± 3.52 and 21.49 ± 3.85) Bq/Kg. The obtained results of the studied rice samples are indicated that it is less than the acceptable limit of those studies established by ma
... Show MoreThe Neutron Fermi Age, t, and the neutron slowing down density, q (r, t) , have been measured for some materials such as Graphite and Iron by using gamma spectrometry system UCS-30 with NaI (Tl) detector. This technique was applied for Graphite and Iron materials by using Indium foils covered by Cadmium and the measurements done at the Indium resonance of 1.46 eV. These materials are exposed to a plane 241Am/Be neutron source with recent activity 38 mCi. The measurements of the Fermi Age were found to be t = 297 ± 21 cm2 for Graphite, t = 400 ± 28 cm2 for Iron. Neutron slowing down density was also calculated depending on the recent experimental t value and distance.
In this paper, isobutane (R-600a) is used as a suitable substitute for (R-134a) when changing the length of capillary tube. And the experimental data on capillary tube are obtained under different conditions such as (subcooling and ambient temperatures) on domestic refrigerator (9ft3 size), this data shows that (R-600a) a suitable substitute for (R134a) .The test presented a model for a steady state, two-phase flow in capillary tube for vapour compression system .The numerical model depends on conservation equations (mass, energy and momentum) as wall as the equation of state for refrigerant. The solution methodology was implemented by using finite difference techniques. The system results indicate that it is possible to change the refri
... Show More