There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (AWGN) and channels disturbed by Rayleigh fading. Both the inherently wideband DCSK modulation and the space-time block code (STBC) are techniques that …
Heterogeneous photocatalysts was a promising material for removing organic pollutants. Titanium dioxide (TiO2) was a suitable photocatalyst for its cost efficiency and high stability to reduce various pollutants. Enhancing TiO2 photocatalyst performance by doping with changed metals or non-metal ions and organic compounds have been reviewed. These methods could enhance photoelectrochemical activity via: (i) by a donor of electrons via electron-donor agents that would produce particular defects in TiO2 structure and capture transporters of charge; (ii) by reducing recombination rate of the charge transporters and increasi
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThis paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n
... Show MoreAspect categorisation and its utmost importance in the eld of Aspectbased Sentiment Analysis (ABSA) has encouraged researchers to improve topic model performance for modelling the aspects into categories. In general, a majority of its current methods implement parametric models requiring a pre-determined number of topics beforehand. However, this is not e ciently undertaken with unannotated text data as they lack any class label. Therefore, the current work presented a novel non-parametric model drawing a number of topics based on the semantic association present between opinion-targets (i.e., aspects) and their respective expressed sentiments. The model incorporated the Semantic Association Rules (SAR) into the Hierarchical Dirichlet Proce
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThe two dimensional steady, combined forced and natural convection in vertical channel is
investigated for laminar regime. To simulate the Trombe wall channel geometry properly, horizontal
inlet and exit segments have been added to the vertical channel. The vertical walls of the channel are
maintained at constant but different temperature while horizontal walls are insulated. A finite
difference method using up-wind differencing for the nonlinear convective terms, and central
differencing for the second order derivatives, is employed to solve the governing differential
equations for the mass, momentum, and energy balances. The solution is obtained for stream
function, vorticity and temperature as dependent variables
The research aims to identify the new reality of Iraq’s international relations through the news
coverage carried out by Al-Iraqiya TV since the size and nature of the coverage indicate the extent
to which these relations have reached. The research problem is summarized by the main question
(what is the size and nature of news coverage of Iraq’s international relations in the Iraqi News
Channel?).
This research is considered a descriptive research, as the researchers used the survey method and the
content analysis method through a partial confinement of the research community consisting of the
main news broadcast for one programmatic period. The content analysis form that was subjected to
evaluation was design
This study aimed at comparing the performance of vertical, horizontal and hybrid subsurface flow systems in secondary treatment for the effluent wastewater from the primary basins at Al-Rustumia wastewater treatment plant, Baghdad, Iraq. The treatments were monitored for six weeks while the testsduration were from 4 to 12 September 2018 under continuous wastewater feeding for chemical oxygen demand (COD), total suspended solid (TSS),ammonia-nitrogen(NH4-N) and phosphate (PO4-P) in comparison with FAO and USEPA standards for effluent discharge to evaluate the suitability of treated water for irrigation purposes. Among the systems planted with Phragmites Australia, the hybrid subsurface flow system which cons
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More