The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.
Three different distribution modules of silicon solar cells in a panel are used in this study . Each module consists of five identical circular silicon solar cells of radius (5cm) and then the total panel areas are identical. The five solar cells are arranged in the panel in different shapes: circular, triangular and rectangular .The efficiency for these three panel distribution are measured indoor and outdoor. The results show that the efficiency is a function of the cells distribution.
The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism .
Tolerance and its impact on building society
The concept of tolerance is gaining its importance in the midst of an international society suffering from violence, wars and internal and international crises. It is practiced by extremist and extremist forces and movements acting in the name of religion to exclude the different Muslim and non-Muslim people according to the unethical practices and methodologies of Islamic law and reality. , Cultural, civilization .. that distinguish our world today. The society today is suffering from the ideas of the intellectual and aesthetic views of the different ideologically, ethnically, culturally and religiously in the world of the South. This is what the end-of-history thesis of Fukuyama and the clash of civilizations represented to Huntington.
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More