The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) with 2×1 and 2×2 Alamouti schemes for different chaotic maps over wireless channels has been studied. It has been shown that the use of these schemes can …
Concrete pavements are essential to modern infrastructure, but their low tensile and flexural strengths can cause cracking and shrinkage. This study evaluates fiber reinforcement with steel and carbon fibers in various combinations to improve rigid pavement performance. Six concrete mixes were tested: a control mix with no fiber, a mix with 1% steel fiber (SF1%), a mix with 1% carbon fiber (CF1%), and three hybrid mixes with 1% fiber content: 0.75% steel /0.25% carbon fiber (SF0.75CF0.25), 0.25% steel /0.75% carbon fiber (SF0.25CF0.75), and 0.5% steel /0.5% carbon fiber ((SF0.5CF0.5). Laboratory experiments including compressive, flexural, and splitting tensile strength tests were conducted at 7, 28, and 90 days, while Finite Element Analys
... Show MoreIn this study, the effect of the thermal conductivity of phase change material (PCM) on the performance of thermal energy storage has been analyzed numerically. A horizontal concentric shell-and-tube latent heat thermal energy storage system (LHTESS) has been performed during the solidification process. Two types of paraffin wax with different melting temperatures and thermal conductivity were used as a PCM on the shell side, case1=0.265W/m.K and case2=0.311 W/m.K. Water has been used as heat transfer fluid (HTF) flow through in tube side. Ansys fluent has been used to analyze the model by taking into account phase change by the enthalpy method used to deal with phase transition. The numerical simulatio
... Show MoreIn this work, the effect of vortex shedding on the solar collector performance of the parabolic trough solar collector (PTSC) was estimated experimentally. The effect of structure oscillations due to wind vortex shedding on solar collector performance degradation was estimated. The performance of PTSC is evaluated by using the useful heat gain and the thermal instantaneous efficiency. Experimental work to simulate the vortex shedding excitation was done. The useful heat gain and the thermal efficiency of the parabolic trough collector were calculated from experimental measurements with and without vortex loading. The prototype of the collector was fabricated for this purpose. The effect of vortex shedding at different operation condition
... Show MoreThe economic units always sought to maintain its market position and Trchinh the technology management and modern methods that will support success factors .vdila about it has become a customer and one profitability analysis of the most practical way benefit of economic units as modern management focus their attention on achieving this satisfaction, as the customers make up the axis of the success of every organization and that there are many government units aiming to profit directs attention to customers and the number of these units increased continuously. The administration used the customer profitability analysis in order to obtain information to assist in making and decision-making process. How to use modern tec
... Show MoreThe direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreThe subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.
The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.
Software Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreAkaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).