The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu
... Show MoreThis paper compare the accurecy of HF propagation prediction programs for HF circuits links between Iraq and different points world wide during August 2018 when solar cycle 24 (start 2009 end 2020) is at minimun activity and also find out the best communication mode used. The prediction programs like Voice of America Coverage Analysis Program (VOACAP) and ITU Recommendation RS 533 (REC533 ) had been used to generat HF circuit link parameters like Maximum Usable Frequency ( MUF) and Frequency of Transsmision (FOT) .Depending on the predicted parameters (data) , real radio contacts had been done using a radio transceiver from Icom model IC 7100 with 100W RF
... Show MoreIn this study, a three-dimensional finite element analysis using ANSYS 12.1 program had been employed to simulate simply supported reinforced concrete (RC) T-beams with multiple web circular openings subjected to an impact loading. Three design parameters were considered, including size, location and number of the web openings. Twelve models of simply supported RC T-beams were subjected to one point of transient (impact) loading at mid span. Beams were simulated and analysis results were obtained in terms of mid span deflection-time histories and compared with the results of the solid reference one. The maximum mid span deflection is an important index for evaluating damage levels of the RC beams subjected to impact loading. Three experi
... Show More