There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code …
Objective(s): To evaluate teachers’ performance of counseling for pupils with Attention Deficit and Hyperactivity Disorder, to identify the relationship between Teachers’ Performance of Counselling for Pupils with Attention Deficit and Hyperactivity Disorder and their demographic.
Methodology: A quasi-experimental (pre-posttest) design was carried out to evaluate teachers’ performance of counseling for pupils with Attention Deficit and Hyperactivity Disorder, at Al-Firdous mixed primary School and to find out the association between teachers' performance about Attention Deficit and Hyperactivity Disorder and their socio-demographic characteristic. The study was started from 18th September 2
... Show MoreIn the present study, the effect of new cross-section fin geometries on overall thermal/fluid performance had been investigated. The cross-section included the base original geometry of (triangular, square, circular, and elliptical pin fins) by adding exterior extra fins along the sides of the origin fins. The present extra fins include rectangular extra fin of 2 mm (height) and 4 mm (width) and triangular extra fin of 2 mm (base) 4 mm (height). The use of entropy generation minimization method (EGM) allows the combined effect of thermal resistance and pressure drop to be assessed through the simultaneous interaction with the heat sink. A general dimensionless expression for the entropy generation rate is obtained by con
... Show MoreThe triggering effect for the face pumping of Nd:YVO4 disc medium of 4×5×0.5 mm was investigated using bulk diode laser at different resonator cavity length in pulse mode and at repetition rate of 1.3kHz. The maximum emitted peak power was found to be 100, 82, and 66 mW for resonator lengths of 10, 13.5, and 17.5 cm respectively, while the threshold pumping power was found to be 41mW. The maximum emitted peak power obtained was 300 mW when using external triggering and 10cm length, with repetition of 3Hz.
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreThe aim of the research was to prepare Pilates exercises using the barrel ladder apparatus and to identify the effect of Pilates exercises on agility, coordination, and motor sequences of third-year female students in artistic gymnastics. The researcher adopted the experimental method to achieve the objectives of the study and to verify its hypotheses, as it is suitable for the nature and problem of the research. In selecting the research population, the researcher carefully chose the sample using a purposive method, clarifying its elements and constituent units. The research population consisted of third-year female students at the College of Physical Education and Sports Sciences for Women / University of Baghdad, with a total of 20 stud
... Show MorePolarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomeno
This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.