Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps have been computed numerically. Increasing the dynamical behavior of the system by using more complex chaotic maps leads to inferiority in the overall system performance. So, in this work, the BER performance for the dual and single chaotic maps by exploiting the benefits of a hybrid Chaos Shift Keying-Multiple-Input-Multiple-Output (CSK-MIMO) communication system has been investigated. The results show that the dual tent map has more randomness, whereas the single logistic map has the least randomness. As well as the CSK-MIMO gives an outstanding BER performance when it compared with the SISO system which helps in reducing the system’s inferiority.
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThis study aims to identify the impact of using the infrastructure of the Information Technology (IT) on the performance of human resources in the public universities. This process is done by doing research in the size, quality, and efficiency of the performance, also speed of achievement and simplification of procedures. Diyala University was chosen for the diagnosis through the opinions and attitudes of its employees. Consequently, suggestions that contribute to improve the performance of the employees and thus its overall performance are obtained. Another objective of this study is identifying the human resources which are currently used in academic institutions and educational services systems because the significant role of th
... Show MoreThe study aims at measuring the dimensions of binding and non-binding social responsibility and its relation to the organizational performance in telecommunication companies in the Republic of Yemen using analytical descriptive approach and questionnaire as a main tool for data collection and comprehensive inventory method.
It has been found that there is a positive effect and significant moral relation between social responsibility with its binding and non-binding dimensions and the organizational performance of telecommunication companies in the Republic of Yemen at a level of significance below (0.05). It has also been found that the correlation between the non-binding social responsibilit
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this paper the use of a circular array antenna with adaptive system in conjunction with modified Linearly Constrained Minimum Variance Beam forming (LCMVB) algorithm is proposed to meet the requirement of Angle of Arrival (AOA) estimation in 2-D as well as the Signal to Noise Ratio (SNR) of estimated sources (Three Dimensional 3-D estimation), rather than interference cancelation as it is used for. The proposed system was simulated, tested and compared with the modified Multiple Signal Classification (MUSIC) technique for 2-D estimation. The results show the system has exhibited astonishing results for simultaneously estimating 3-D parameters with accuracy approximately equivalent to the MUSIC technique (for estimating elevation and a
... Show MoreMany managers in geometrical and technical organizations prefer to deal with quantitative values to choose between the available options and choose the best alternative to avoid randomization and bias in decision making. One of them Baghdad Water Department, which seeks to develop the quality of its product (drinking water) and achieve its objectives under increasing growing population and the demand for water, Some of TQM tools, especially the statistical, have this ability because there is chance to use historical data and experiment of employees in Application . Two statistical tools were applied: the nominal group technique, matrix data analysis technique as well as the brainstorming tool to search for the best o
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreBaghdad city has been faced numerous issues related to freshwater environment deteriorations due to many reasons, mainly was the discharge of wastewater without adequate treatment. Al- Rustamiya Wastewater Treatment Plant (WWTP) have been constructed among many plants in Baghdad city to reduce the amount of wastewater discharged into natural environment and its subsequent adverse effects. This study was conducted to evaluate the performance of the plant which consist of a conventional activated sludge (CAS) and sequencing batch reactors (SBR) systems as secondary treatment units and its ability to meet Iraqi specifications. A reliability level determination and analysis also were conducted to find the plant's stability and its capabi
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show More