The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB R 2011a and system generator ISE14.1/SIMULINK.
Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives
... Show MoreIt is a moral presumption that includes the object for its sake, and it is called the object for it or the object for its sake, which is the present tense after (lam, ki, fa, willn, and then), and it is not an excuse for the occurrence of the matter (1), and it requires a connection between the two sides of (a cause with a cause) united by a reason for a specific purpose (2). The object has a reason or an excuse, because it is an explanation of what came before it, of the cause. The reason for the occurrence of the action, being the motive for causing the action and the bearer of it (3), indicates that the infinitive is restricted to a special reason. So if I said: (I came to you with the hope of honoring you), then I attributed the coming
... Show MoreThis research seeks through the adoption of two basic variables, where he considered the actuarial experience as an independent variable, while the process of accepting the risk and dimensions related to it is a dependent variable, the research was adopted to present the data achieved by the company during the life insurance business during the adoption of actuarial experience at the beginning of its work where Adoption of the historical method in the analysis of those data to prove the researcher's opinion, through the analysis of data (5 years) for the first period, which extends between (1975-1979), the period during which the company adopted the actuarial experience at the time, also taken data for the same dimensions related to the
... Show MoreThe research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability
... Show MoreIn this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the stud