The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB R 2011a and system generator ISE14.1/SIMULINK.
The Jeribe reservoir in the Jambour Oil Field is a complex and heterogeneous carbonate reservoir characterized by a wide range of permeability variations. Due to limited availability of core plugs in most wells, it becomes crucial to establish correlations between cored wells and apply them to uncored wells for predicting permeability. In recent years, the Flow Zone Indicator (FZI) approach has gained significant applicability for predicting hydraulic flow units (HFUs) and identifying rock types within the reservoir units.
This paper aims to develop a permeability model based on the principles of the Flow Zone Indicator. Analysis of core permeability versus core porosity plot and Reservoir Quality Index (RQI) - Normalized por
... Show MoreObjectives Dental implant is a revolution in dentistry; some shortages are still a focus of research. This study use long duration of radiofrequency (RF)–magnetron sputtering to coat titanium (Ti) implant with hydroxyapatite (HA) to obtain a uniform, strongly adhered in a few micrometers in thickness. Materials and Methods Two types of substrates, discs and root form cylinders were prepared using a grade 1 commercially pure (CP) Ti rod. A RF–magnetron sputtering device was used to coat specimens with HA. Magnetron sputtering was set at 150 W for 22 hours at 100°C under continuous argon gas flow and substrate rotation at 10 rpm. Coat properties were evaluated via field emission scanning electron microscopy (FESEM), scanning electro
... Show MoreThe main goal of this study is to evaluate Mishrif Reservoir in Abu Amood oil field, southern Iraq, using the available well logs. The sets of logs were acquired for wells AAm-1, AAm-2, AAm-3, AAm-4, and AAm-5. The evaluation included the identification of the reservoir units and the calculation of their petrophysical properties using the Techlog software. Total porosity was calculated using the neutron-density method and the values were corrected from the volume of shale in order to calculate the effective porosity. Computer processed interpretation (CPI) was accomplished for the five wells. The results show that Mishrif Formation in Abu Amood field consists of three reservoir units with various percentages of h
... Show MoreThis paper studies the influence of an inclined magnetic field on peristaltic transport of incompressible Bingham plastic fluid in an inclined symmetric channel with heat transfer and mass transfer. Slip conditions for heat transfer and concentration are employed. The formulation of the problem is presented through, the regular perturbation technique for small Bingham number Bn is used to find the final expression of stream
function, the flow rate, heat distribution and concentration distribution. The numerical solution of pressure rise per wave length is obtained through numerical integration because its analytical solution is impossible. Also the trapping phenomenon is analyzed. The effe
This paper deals with constructing mixed probability distribution from exponential with scale parameter (β) and also Gamma distribution with (2,β), and the mixed proportions are ( .first of all, the probability density function (p.d.f) and also cumulative distribution function (c.d.f) and also the reliability function are obtained. The parameters of mixed distribution, ( ,β) are estimated by three different methods, which are maximum likelihood, and Moments method,as well proposed method (Differential Least Square Method)(DLSM).The comparison is done using simulation procedure, and all the results are explained in tables.
Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
The World witnessed over the past few decades a clear change in the urban existence map, where the number of cities' residents has increased and the cities geographic area expanded, also networks of roads and electric power stations were spread. This extraordinary events caused the drawing of a different identity to the world, race with itself in the field of energy and raw materials consumption. Therefore, the research issue individualizes in the lack of available knowledge concerning the subject of environment friendly ecological urban desiging and planning.So the research aims to define the environmentally friendly eco-city' structural elements and to clarify their most important planning and design foundations. To In
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreFinding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.