The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the sequences that will be recognized for next transmissions. In 2017 Code and Phase Hopping Techniques are both proposed to resolve the most recent problem in security-related, but not with FHSS, therefore in this paper presents a new composed proposed system will progress Phase Shift and Code Hopping in Code Division Multiplexing Access (CDMA) to complement with FHSS; because the wireless Communications systems security in the last years became a nightmare for some individuals, also companies, and even countries, also join them needing for higher bits rate in the wireless channels; because of next-generation communication system 5G-6G and the evolution in social networking, IoT, stream media, IoE, visualizations, and cloud computing. The new ideas can be applicable for a large number of users, also fast implementation without synchronization, as well as without any focus on encryption or keys-exchanges, at completion all results are simulation in MATLAB R2017b, the results have been tested by using 8 users in the same time, also our results showing promises effects on security for both applied systems Phases Shift and Codes Hopping especially the Code Hopping, therefor; our results encouraged us to complete research and compare our system with other.
This paper presents L1-adaptive controller for controlling uncertain parameters and time-varying unknown parameters to control the position of a DC servomotor. For the purpose of comparison, the effectiveness of L1-adaptive controller for position control of studied servomotor has been examined and compared with another adaptive controller; Model Reference Adaptive Controller (MRAC). Robustness of both L1-adaptive controller and model reference adaptive controller to different input reference signals and different structures of uncertainty were studied. Three different types of input signals are taken into account; ramp, step and sinusoidal. The L1-adaptive controller ensured uniformly bounded
... Show MoreHygienic engineering has dedicated a lot of time and energy to studying water filtration because of how important it is to human health. Thorough familiarity with the filtration process is essential for the design engineer to keep up with and profit from advances in filtering technology and equipment as the properties of raw water continue to change. Because it removes sediment, chemicals, odors, and microbes, filtration is an integral part of the water purification process. The most popular technique for treating surface water for municipal water supply is considered fast sand filtration, which can be achieved using either gravity or pressure sand filters. Predicting the performance of units in water treatment plants is a basic pri
... Show MoreStress is an inevitable part of life. Stress occurs when stressful events of self, environmental, or social origin affect the individual's resilience and threaten to collapse his psychological and physical systems. The stress represents difficulties and obstacles that may exceed the individual's ability to bear them and deal with them, which causes him stress and causes negative effects on his psychological and physical health. Therefore, the current research aimed to identify the negative effects of psychological stress on the psychological and physical health of the individual through the literature that dealt with this topic. It was among the results of the research that one of the negative effects of stresses on mental health is the
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreUltrasound has been used as a diagnostic modality for many intraocular diseases, due its safety, low cost, real time and wide availability. Unfortunately, ultrasound images suffer from speckle artifact that are tissue dependent. In this work, we will offer a method to reduce speckle noise and improve ultrasound image to raise the human diagnostic performance. This method combined undecimated wavelet transform with a wavelet coefficient mapping function: where UDWT used to eliminate the noise and a wavelet coefficient mapping function used to enhance the contrast of denoised images obtained from the first component. This methods can be used not only as a means for improving visual quality of medical images but also as a preprocessing
... Show MoreThe research aims to shed light on the impact of the application of the electronic services system on electronic banking activities in a sample of Iraqi banks, as investment in technology is the most important factor for the success and future growth of administrative companies in general, and banking in particular, as global economic developments in the field of Technology has led the majority of banking sectors in the world to undergo deep reforms and radical changes in the entity of their systems and mechanisms to confront competition and keep pace with economic changes, as the concept of banking services and its diversity changed with it, especially since persistence in the traditional approach no longer gi
... Show MoreDue to the large size of dealing in the transactions installment sales in durable products, especially real estate given the privacy to enjoy their property, among other products because of the large amount and the length of the repayment period leading to a risk of non-payment by the buyer because of the possibility to change the credit level to him, especially that most of this type of transaction customers are from limited income owners, So it has been proposed the use of other transactions in handling real estate instead of installment sales transactions, a rental sale transactions because of the protection provided by this transaction for a vendor that will be mentioned later.
So proposes to st
... Show MoreAbstract
The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show More