There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreIn this paper, the human robotic leg which can be represented mathematically by single input-single output (SISO) nonlinear differential model with one degree of freedom, is analyzed and then a simple hybrid neural fuzzy controller is designed to improve the performance of this human robotic leg model. This controller consists from SISO fuzzy proportional derivative (FPD) controller with nine rules summing with single node neural integral derivative (NID) controller with nonlinear function. The Matlab simulation results for nonlinear robotic leg model with the suggested controller showed that the efficiency of this controller when compared with the results of the leg model that is controlled by PI+2D, PD+NID, and F
... Show MorePurpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci
... Show MoreAbstract
The mine object for this research is determine the nature of the relation and effect between Human resources management strategic to less the work stress , Human resources management strategic represent a set of procedures and practices to manage the human resources at the organization. the stress of work effect on the performance of the human resources , al rasheed bank select to applied the qustioneer on the 32 person the work on the sebaa branch , using the qustioneer as a tool to collect data that is design according some of the standards and make the validity and stability. to analyses this data by using spss for computation " percentage , mean , standard , deriation
... Show MoreBackground: Earlier reports related the presence of Mouse Mammary Tumor Virus -like gene sequences to human breast carcinoma. Mouse Mammary Tumor Virus -like gene is a retrovirus, namely, a virus containing reverse transcriptase which transcript its RNA to DNA in a process that enables genetic material from the retrovirus to become a part of the genes of an infected cell permanently. The virus that found in women was designated as Human Mammary Tumor Virus by the authors, who have investigated the presence of Human Mammary Tumor Virus sequences in a many human breast tissues and in many countries.
Objectives: Detect HMTV genome in Iraqi women of breast cancer.
Patients and Methods
... Show MoreHuman cytomegalovirus (HCMV) has a worldwide distribution and common infections. The presence of HCMV genome and antigens has been detected in many kinds of human cancers. The proto-oncogene Her2/neu is overexpressed in 25% to 30% of human breast cancers and frequently associated with tumor aggressiveness and worse prognosis. Examination was applied to detect different HCMV antigens and to demonstrate their correlation with Her2/neu overexpression in breast cancer. The present study includes samples from 70 women of 60 breast cancer patients and 10 normal breast tissues. Formalin-fixed paraffin embedded tissue blocks were obtained from each woman according to ethical approval. Human cytomegalovirus early antigen expression was detected in 5
... Show MoreThis study aimed to evaluate the IHC expression of CDX2 protein in HGC patients and control groups and also to study the correlation between IHC expression of the CDX2 and different clinicopathological variables such as: age, gender, histopathological subtype, grade, and stage of the tumor in HGC cases. the retrospectively sectional study for the period from 2014 to 2018 included a total of 60 formalin fixed paraffin embedded blocks of the HGC tissue (partial or total gastrectomy specimens) that collected from the archived materials of the Department of Pathology of Baghdad Teaching Hospital and the Center of Gastrointestinal and Hepatic Diseases, and also some samples were collected from other private laboratories. The IHC expression of th
... Show MoreWireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show More