There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code …
Delays and disruption are a common issue in both community and personal building programs The problem exists all throughout the world, but it is particularly prevalent in Iraq, where millions of dollars are squandered each time as a outcome. Delays and interruptions may have serious consequences not just for Iraq's construction plans, but also for the country's economic and social status. While numerous studies have been conducted to investigate the factors driving delays and disruption in Iraqi construction projects, slight consideration has been given to by what means project management implements and approaches have affected the occurrence of project delays and disruption. After analyzing the crucial reasons for delays and instability in
... Show MoreThis study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, re
... Show MoreBackground: Lung cancer is a common disease for patients over the age of 50 years, especially males due to smoking habits. This study aimed to compare the modulation complexity score (MCS) for the advanced treatment planning techniques which the intensity modulated radiation therapy (IMRT) and volumetric modulated arc therapy (VMAT). Materials and Methods: Thirty patients who had non-small lung cancerous tumors on their left side participated in this study. The range ages were 68 to 98 years, the heights were between 151 and 182cm and they having weights from 46 to 79 kg. For Each patient will create two plans dial using two different techniques, which will be Intensity Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy
... Show MoreThe objective of the study was to identify the effectiveness of a training program based on the employment of the educational portal in the development of the skills of the administrative body in the basic education schools in Dhofar Governorate. To achieve the goal, a training program was designed that includes the skills of the educational portal to be met by the administrative body and measuring its effectiveness. A questionnaire to identify training needs, and a notecard to evaluate performance. The study sample consisted of (70) individuals of the administrative staff. The researchers used the descriptive-analytical method to identify the training needs, design and build the training program and the experimental method for applying
... Show MoreBreast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o
... Show MoreThe study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and
ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).
... Show MoreReservoir study has been developed in order to get a full interesting of the Nahr Umr formation in Ratawi oil field. Oil in place has been calculated for Nahr Umr which was 2981.37 MM BBL. Several runs have been performed to get matching between measured and calculated of oil production data and well test pressure. In order to get the optimum performance of Nahr Umr many strategies have been proposed in this study where vertical and horizontal wells were involved in addition to different production rates. The reservoir was first assumed to be developed with vertical wells only using production rate of (80000–125000) STB/day. The reservoir is also proposed to produce using horizontal wells besides vertical wells with pr
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show More