Visible Light Communication (VLC) has emerged as a powerful technique for wireless communication systems. Providing high data rate and increasing capacity are the major problems in VLC. Recent evidence suggests that Multiple Input Multiple Output (MIMO) technique can offers improved data rates and increased link range. This paper describes the design and implementation of visible light communication system in indoor environment exploring the benefits of MIMO. The specific objective of this research was to implement a 4× 4 Multiple Input (LEDs) Multiple Output (photodetectors)-VLC communication system, where a 16 white power LEDs in four arrays are setting up at transmitter and four RX modules are setting up at receiver side without the need for additional power or bandwidth as well as analyze a mathematical model for a VLC-× 4 MIMO with different modes such as the suitable angles to cover the entire room. The research designs practically an electronic circuit for the transmitter and receiver with inexpensive components. The power distribution of different propagation modes is calculated for Single Input Single Output (SISO) and MIMO channels in typical room dimensions. The results in this paper indicate that the power is distributed uniformly for entire room when implemented VLC-MIMO as compared to VLC-SISO. Furthermore, a 4× 4 MIMO implementing VLC is compared in term of BER vs. SINR with SISO communication system for both Line of Sight (LOS) and Non Line of Sight (NLOS) propagation modes. Comparing the two results of LOS and NLOS, it can be seen that a 4× 4 MIMO implementing VLC for LOS perform better …
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreIn this work, a deep computational study has been conducted to assign several qualities for the graph . Furthermore, determine the amount of the dihedral subgroups in the Held simple group He through utilizing the attributes of gamma.
Background: The stethoscope is a tool that doctors use daily in the examination of patients and it can take part in the transmission of health care-associated infections. In a single day it may come in direct contact with multiple patients and the intra hospital environment may be contaminated by various type of bacteria and possibly transmit to others.
Objective:- The study was to know the attitude and knowledge about the stethoscope hygiene behavior among physicians and to determine the types of bacterial agents that can contaminate stethoscopes.
Type of the study: The study was a cross-sectional study
Metho
... Show MoreThis research aims at calculating the optimum cutting condition for various types of machining methods, assisted by computers, (the computer program in this research is designed to solve linear programs; the program is written in v. basic language). The program obtains the results automatically, this occur through entering the preliminary information about the work piece and the operating condition, the program makes the calculation actually by solving a group of experimental relations, depending on the type of machining method (turning, milling, drilling). The program was transferred to package and group of windows to facilitate the use; it will automatically print the initial input and optimal solution, and thus reduce the effort and t
... Show MoreKE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15
This study deals with knowing the public relations activities of the Integrity Commission for the year 2007, knowing the contents of these activities, knowing the contents of the advertisements that it published, whether the contents of the advertisements were convincing, and whether press photographs were used in these advertisements, as well as whether symbols and slogans were used. What language and words were used to address the recipient? 1- What feelings do the contents of advertisements arouse? 2- Research objectives: This research aims to answer the following questions: What are the public relations activities carried out by the Integrity Commission? B: Are the contents of the advertisements published by the Authority convincing to
... Show More