The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB R 2011a and system generator ISE14.1/SIMULINK.
The paper presents an overview of theoretical aspects of small radio telescope antenna parameters. The basic parameters include antenna beamwidth, antenna gain, aperture efficiency, and antenna temperature. These parameters should be carefully studied since they have vital effects on astronomical radio observations. The simulations of antenna parameters were carried out to assess the capability and the efficiency of small radio telescopes to observe a point source at a specific frequency. Two-dimensional numerical simulations of a uniform circular aperture antenna are implemented at different radii. The small diameter values are chosen to be varied between (1-10) m. This study focuses on a small radio telescope with a diameter of 3 m sin
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing
In this paper, we investigate the basic characteristics of "magnetron sputtering plasma" using the target V2O5. The "magnetron sputtering plasma" is produced using "radio frequency (RF)" power supply and Argon gas. The intensity of the light emission from atoms and radicals in the plasma measured by using "optical emission spectrophotometer", and the appeared peaks in all patterns match the standard lines from NIST database and employed are to estimate the plasma parameters, of computes electron temperature and the electrons density. The characteristics of V2O5 sputtering plasma at multiple discharge provisos are studied at the "radio frequency" (RF) power ranging from 75 - 150 Wat
... Show MoreThe main goal of this research is to determine the impact of some variables that we believe that they are important to cause renal failuredisease by using logistic regression approach.The study includes eight explanatory variables and the response variable represented by (Infected,uninfected).The statistical program SPSS is used to proform the required calculations
A total of 116 males with primary infertility and 32 fertile males (normozoospermia;
NOR) were studied to evaluate parameters of seminal fluid analysis. Based on WHO criteria
of 2010 for general seminal fluid analysis, the patients were distributed into three groups: 32
azoospermic (AZO), 40 oligozoospermic (OLI) and 44 asthenozoospermic (AST) patients.
AZO and OLI patients and NOR shared an approximated mean of seminal fluid volume (2.25,
2.75 and 2.50 ml, respectively), while it was significantly increased (3.58 ml) in AST patients.
In NOR men, the spermatozoa concentration was 65.13 x 10
6
spermatozoa/ml, while it was
significantly decreased in AST (51.42 x 10
6
spermatozoa/ml) and OLI (5.58 x 10
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreAbstract
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search th
... Show More