The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the sequences that will be recognized for next transmissions. In 2017 Code and Phase Hopping Techniques are both proposed to resolve the most recent problem in security-related, but not with FHSS, therefore in this paper presents a new composed proposed system will progress Phase Shift and Code Hopping in Code Division Multiplexing Access (CDMA) to complement with FHSS; because the wireless Communications systems security in the last years became a nightmare for some individuals, also companies, and even countries, also join them needing for higher bits rate in the wireless channels; because of next-generation communication system 5G-6G and the evolution in social networking, IoT, stream media, IoE, visualizations, and cloud computing. The new ideas can be applicable for a large number of users, also fast implementation without synchronization, as well as without any focus on encryption or keys-exchanges, at completion all results are simulation in MATLAB R2017b, the results have been tested by using 8 users in the same time, also our results showing promises effects on security for both applied systems Phases Shift and Codes Hopping especially the Code Hopping, therefor; our results encouraged us to complete research and compare our system with other.
Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreExperimental tests were conducted to investigate the thermal performance (cooling effect) of water mist system consisting of 5μm volume median diameter droplets in reducing the heat gain entering a room through the roof and the west wall by reducing the outside surface temperature due to the evaporative cooling effect during the hot dry summer of Baghdad/Iraq. The test period
was Fifty one days during the months May, June, and July 2012. The single test day consists of 16 test hours starting from 8:00 am to 12:00 pm. The results showed a reduction range of 1.71 to 15.5℃ of the roof outside surface temperature and 21.3 to 76.6% reduction in the daily heat flux entering the room through the roof compared with the case of not using w
That the electronic payments system plays an important role in the effectiveness of commercial banks by attracting domestic or foreign investors, especially in the banking sector , It must keep abreast of global developments and technology in the field of banking that lead to the effectiveness of the bank by providing modern banking services and good customer service that improves the reputation of the bank, as well as develop its activities and promotes economic development at the country level , The technological progress of the bank will increase the speed of conducting banking operations, accuracy and safer , here should be laws and regulations related to electronic payment systems keep pace with the la
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThe organization uses many techniques and methods to ensure that they will succeed and adapted with velocity change in the internal and external environment by decision taking, especially strategic decisions.
Strategic decisions are very important for organization success because it can predict the future and deal with uncertainty, in this circumstances they need accurate and comprehensive information to make effective strategic decision.
To achieve that purpose it must owned successful Strategic Information System ( SIS ) and determined the critical success factors for this system ,which can assisted the worker to focus on the important activities to develop it.
... Show MoreBromocriptine mesylate is a semisynthetic ergot alkaloid derivative with potent dopaminergic activity, used in the treatment of pituitary tumors, Parkinson's disease (PD), hyperprolactinaemia, neuroleptic malignant syndrome, and type 2 diabetes ,the oral bioavailability is approximately 6%, therefore aim its prepare and evaluate bromocriptine mesylate as liquid self nano emulsifying drug delivery system to enhance its solubility , dissolution and stability . Solubility study was made in different vehicles to select the best excipients for dissolving bromocriptine mesylate. Pseudo-ternary phase diagrams were constructed at 1:1, 2:1, 3:1 and 4:1 ratios of surfactant and co-surfactant, four formulations were pre
... Show MoreThe food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu
... Show MoreSummary Kidney transplantation is widely performed nowadays as an optimal treatment of end stage kidney diseases. Complications such as stenosis in graft renal arteries anastomosis may occur. Different suturing techniques are available for renal artery anastomosis. We aimed to compare the incidence of renal artery stenosis of the transplanted kidney when two suture techniques (continuous or interrupted) used for renal artery anastomosis. Therefore, a retrospectively comparative study was conducted on 44 patients managed with kidney transplantation during the years 2009-2011. Patients assigned into two groups; first group included 20 patients namely, continuous suture group, and the second group included 24 patients in whom the allograft art
... Show More