There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreType 2 diabetes mellitus (DM) is a group of metabolic disorder disease. The inflammatory markers act as a new risk factor for development of type 2 diabetes with a possible association with ABO/Rh blood groups. Human ABO genes are located on chromosome 9q34.1-q34.2. The aim of this study was to investigate the possible association between inflammatory markers, interleukin (IL) -18 and IL-33 in type 2DM and ABO blood groups. Sixty four patients with newly diagnosed type2 DM and control group consist of twenty healthy Iraqi individual. Laboratory test were include ABO blood groups using standard serological procedures and detection IL-18 and IL-33 in serum by ELISA kits. The Present data showed a significant increase i
... Show MoreA novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in
... Show MoreWater supply networks are marred by serious risks of imperceptible pipeline leakage, posing sustainability and performance threats. This article highlights the use of vibratory signal features to get around the drawbacks of traditional methods in a highly detailed framework for leak detection based on CatBoost. demonstrated excellent diagnostic performance and carried out a thorough test performance evaluation on five leakage configurations . The expected system achieved an accuracy of 98.1% (variance (well within x/3% of expected):, beating traditional competitors such as Random Forest (97.3%) and Support Vector Machine (93.8%). For example, the area under the receiver-operating characteristic curve was 0.995, in
... Show MoreThe research objective are analyze financial leverage advantage through analyze and discuss financial leverage cost, and achieve tax advantage. study include two firms ,oil firm and industrial companies firm with limited liability.The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial leverage achieve present value of the costs is Negative . The study concluded that the most important conclusions of the tax advantage of leverage is higher costs as well as achieving a low tax shield ,This study found out the results that interest payments related to pre-tax all of the loan amount and the percentage of the interest rate on b
... Show MoreBackground: Because of many factors play a role in the developing of late lower arch crowding, therefore the objective of the current study is to do vertical analysis for subjects with late lower dental arch crowding. The conducted study is the first attempt to do vertical analysis for Iraqi subjects with late lower arch crowding to see if there is a vertical discrepancy in such patients. Subjects and methods: Eighty subjects were selected according to certain inclusion criteria from patients attending the Orthodontic Department in the College of Dentistry, Baghdad University, patients ranged between 18-25 years old. The 80 patients were divided into two groups (crowding and normal), 40 patients each (20 males and 20 females). A study cast
... Show MoreThe seismic can be threatened the stability of the flexible body of the earth dam and can cause completely damaged or deformation on their embankment. Therefore, a geotechnical engineer needs to know the effect of earthquakes on earth structures. The change in the seismic zone that recently Iraq affected is the reason for this research, in general, in 2017, the whole of Iraq, and in particular the region, where the Al-Wand earth dam (the subject of the study) is located, was exposed to several earthquakes. This research project mainly aims to study the behavior of Al-Wand earth dam under seismic load in different conditions by simulating Al-Wand earth dam through numerical modeling an
Abstract
Robotics manipulators with structural flexibility provide an attractive alternative to rigid robotics manipulators for many of the new and evolving applications in robotics. In certain applications their use is unavoidable. The increased complexity in modeling and control of such manipulators is offset by desirable performance enhancements in some respects. In this paperthe single- link flexible robotics manipulator was designed and implemented from Perspex and designed with 0.5 m length , 0.02 m width and with 0.004 m thickness with mass located at the tip. There are four subsystems; motion, control, accelerometer and gyro and a host computer subsystem. The work principle of single-link robotics manipul
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.