The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB R 2011a and system generator ISE14.1/SIMULINK.
Theoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreIn addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cult
... Show MoreEngineering equipment is essential part in the construction project and usually manufactured with long lead times, large costs and special engineering requirements. Construction manager targets that equipment to be delivered in the site need date with the right quantity, appropriate cost and required quality, and this entails an efficient supplier can satisfy these targets. Selection of engineering equipment supplier is a crucial managerial process .it requires evaluation of multiple suppliers according to multiple criteria. This process is usually performed manually and based on just limited evaluation criteria, so better alternatives may be neglected. Three stages of survey comprised number of public a
... Show MoreBackground: Acute cholecystitis is common surgical
problem, which was treated previously by conservative
treatment .Later early open has been introduced as an
alternative to interval for treatment of acute cholecystitis.
Early open was found to be a safe, successful with
comparable postoperative complication rate. With the
advent of laparoscopy laparoscopic have been used for
chronic cholecystitis and became the first line of
treatment. New reports have shown that laparoscopic can
be used as an alternative to open for surgical treatment of
acute cholecystitis.
Objectives: to compare the success, safety of early
laparoscopic versus early open as a primary treatment of
acute cholecystitis.
Methods:
There are no single materials which can withstand all the extreme operating conditions in modern technology. Protection of the metals from hostile environments has therefore become a technical and economic necessity.
In this work, for enhancing their wear-resistance, boride layers were deposited on the surface of low carbon steel by a pack cementation method at 850 °C for (2, 4, and 6) h using vacuum furnace. The boronizing process was achieved using different concentration of boron source (20, 25, and 30) % wt. into coating mixture to optimize the best conditions which ensure the higher properties with lower time. The coating was characteristic by X ray diffraction (XRD), and it is confirmed t
... Show MoreWalter Lippmann, speaking about man, says : ” Gradually he makes for himself a trustworthy picture inside his head of the world beyond his reach. “. This means that the picture, whether it was good or bad, it doesn’t happen for nothing, but rather for intentional purposes. Some orientalists make their judgements even before getting to the place concerned with the study.
The mental image is one of the most misused terminology, although the world today has become the world of image, it witnessed the disappearance of the theories that used to consider the media as a reflective mirror for society, also it was confirmed that the media creates what varies from reality and sometimes completely different from reality. The image of
... Show MoreThe research, entitled: "The Development Theory of Women's Empowerment in Islamic Sharia Law ", aims to show the means of human development for women through the texts of the Quran and Sunnah. It talked about the concept of human development for women, the goals of women's empowerment in legislative texts, the goals of human development in empowering women, the developmental aspect of women in the Sunnah of the Prophet, the integration of development in Islamic Sharia Law , and then the conclusion and sources.
Writing in English is one of the essential factors for successful EFL learning .Iraqi students at the preparatory schools encounter problems when using their background knowledge in handling subskills of writing(Burhan,2013:164).Therefore, this study aims to investigate the 4thyear preparatory school students’ problems in English composition writing, and find solutions to these pro
... Show More