This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Recent investigations show that wireless communication systems are very promising application area of chaotic dynamics. A feature of chaotic signals is super wide bandwidth; the power spectrum extends both to the region of very low frequencies as well as to high frequencies. For the proposed system, the bandwidth is extended from approximately 100 Hz to 50 MHz. The nature of chaotic signal is an aperiodic. Therefore, the resolution of the proposed system is high to provide an aperiodicity of the chaotic signal. In practice the following simulation results on MATLAB software platform show that the effectiveness of the model described which has low-cross-correlation and can meet the actual need. Simulation results show sequence length in 264-1-bit with cross-correlation less than 0.0025 for our architecture.
Generalized multivariate transmuted Bessel distribution belongs to the family of probability distributions with a symmetric heavy tail. It is considered a mixed continuous probability distribution. It is the result of mixing the multivariate Gaussian mixture distribution with the generalized inverse normal distribution. On this basis, the paper will study a multiple compact regression model when the random error follows a generalized multivariate transmuted Bessel distribution. Assuming that the shape parameters are known, the parameters of the multiple compact regression model will be estimated using the maximum likelihood method and Bayesian approach depending on non-informative prior information. In addition, the Bayes factor was used
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreDrones are highly autonomous, remote‐controlled platforms capable of performing a variety of tasks in diverse environments. A digital twin (DT) is a virtual replica of a physical system. The integration of DT with drones gives the opportunity to manipulate the drone during a mission. In this paper, the architecture of DT is presented in order to explain how the physical environment can be represented. The techniques via which drones are collecting the necessary information for DT are compared as a next step to introduce the main methods that have been applied in DT progress by drones. The findings of this research indicated that the process of incorporating DTs into drones will result in the advanc
The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits
... Show MoreThis work deals with the preparation of a zeolite/polymer flat sheet membrane with hierarchical porosity and ion-exchange properties. The performance of the prepared membrane was examined by the removal of chromium ions from simulated wastewater. A NaY zeolite (crystal size of 745.8 nm) was prepared by conventional hydrothermal treatment and fabricated with polyethersulfone (15% PES) in dimethylformamide (DMF) to obtain an ion-exchange ultrafiltration membrane. The permeate flux was enhanced by increasing the zeolite content within the membrane texture indicating increasing the hydrophilicity of the prepared membranes and constructing a hierarchically porous system. A membrane contain
The aim of this research work is to study the effect of stabilizing gypseous soil, which covers
vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties
to be used as a base course layer replacing the traditional materials of coarse aggregate and broken
stones which are scarce at economical prices and hauling distances.
Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%,
medium curing cutback asphalt (MC-30), and hydrated lime are used in this study.
The conducted tests on untreated and treated gypseous soil with different percentages of medium
curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and o
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More