Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …
The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreBackground: A minimally invasive antral membrane balloon elevation (MIAMBE) has been introduced to overcome the invasiveness of modified Caldwell-Luc (lateral approach) and the drawbacks of the osteotome (summers' technique) in maxillary sinus floor elevation surgery. Materials and methods: A total of 13 adult Iraqi patients aged 28-55 years, 4 males and 9 females underwent sinus floor elevation surgery via crestal approach by using sinus balloon technique. A panoramic radiograph and (Cone beam computed tomography (CBCT)/or medical CT scan) were obtained before and after surgery. Postoperative gained bone was assessed and the patient reactions including pain, nasal bleeding, and ecchymosis were recorded. The whole follow up period was 1yea
... Show MoreThis research is carried out to study the effect of the external post-tensioning technique on the flexural capacity of simply supported composite castellated beam experimentally. In this research, seven composite castellated beams having the same dimensions and material properties were cast and tested up to failure by applied two concentrated loads at 700 mm from each end. Two external strands of 12.7 mm diameter were fixed at each side of the web of strengthening beams and located at depth 180 mm from top fiber of the section (dps) at each end of the beam. The strands have been tensioned by using a hydraulic jack with a constant stress of 100 MPa. This research aims to study the effect of the strengthening by different shapes of st
... Show MoreNoor oil field is one of smallest fields in Missan province. Twelve well penetrates the Mishrif Formation in Noor field and eight of them were selected for this study. Mishrif formation is one of the most important reservoirs in Noor field and it consists of one anticline dome and bounded by the Khasib formation at the top and the Rumaila formation at the bottom. The reservoir was divided into eight units separated by isolated units according to partition taken by a rounding fields.
In this paper histograms frequency distribution of the porosity, permeability, and water saturation were plotted for MA unit of Mishrif formation in Noor field, and then transformed to the normal distribution by applying the Box-Cox transformation alg
... Show MoreObjectives: The study aims to evaluate patients’ performance toward insulin injection after training program to
identify the variation in skill of patients in insulin injection technique with regard to some variable (i.e.
educational level and duration of insulin injection.
Methodology: A quasi experimental study has been conducted on diabetic patients.
An observational checklist had been prepared which consisted of 4 main areas with 37 sub-items, which are
syringe preparation for injection, insulin drawing; skin preparation for injection and insulin injection. Each of the
sub-items has 2 options yes or no. One score for positive answer and zero for no.
The sample of the study consisted of (n =30) males and females
A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More