Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThis work investigates a simulation model of an underwater optical wireless communication (UOWC) system. Several water scenarios are considered: Harbor I (HA-I), Harbor II (HA-II), Coastal Ocean (CO), Clear Ocean (CL), and Pure Sea (PU). A laser diode (LD) with modulation schemes (NRZ-OOK) transmits data at various speeds of 2.5 Gbps, 5 Gbps, and 10 Gbps. To identify the optical signal, a single-photon detection (SPD), APD and PIN photodiodes are utilized. The analytical evaluation of the performance is executed using Q-factor, received power and bit error rate (BER). According to the results, the PU achieved an underwater distance of 35.5 m, 35 m, 34.5 m, for data tran
The purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be
... Show MoreThe reform process is a dynamic process going on, especially the administrative and financial reform, which contributes to the work and directing operations towards success and continuous development, which requires determining the validity and the responsibility and the rights and duties of all officials in the school settings (within the formations educational institutions) for the purpose of reducing the administrative and financial corruption, and then ensure management efficient and effective way by taking advantage of the physical, financial and human resources available to achieve the greatest benefit at the lowest cost to the fact that the follow-up performance on an ongoing basis in accordance with the specific of powers
... Show MoreBackground: Periodontitis (PD) is well-known chronic disease affecting the periodontal ligament and alveolar bone, Osteoarthritis (OA) is a chronic joint disease with compound reasons characterized by synovial inflammation, subchondral bone remodeling, also the formation of osteophytes, that cause cartilage degradation. Chronic periodontitis and osteoarthritis are considered widely prevalent diseases and related to tissue destruction due to chronic inflammation in general health and oral health. The aim of this study is todetermine the association of chronic periodontitis and osteoarthritits in patients by analysing tumor necrosis factor alpha TNFα and high sensitive c-reactive protein (hsCRP) in the serum. Materials and Method: A tot
... Show More The present study aimed at ((building an educational -learning design based on the theory of Merrill in (CDT) and measuring the effectiveness of this design in the motivation and achievement of the high school fifth grade students to art education in the subject of the history of modern art)). The research community is made of fifth grade preparatory students in the secondary school of Umm Ayman in the Directorate of Education of Baghdad / Ar-Rusafa in a simple random way. The study sample (58 students) was chosen from section (e) to study according to Merrill theory (CDT) and section (d) to study according to the traditional way.
The pilot design of the control and experimental equivalent groups that have partial control in t
The inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreChemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.
Background: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degr
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More