Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …
At present, numerous novel chemical compounds face challenges related to their limited solubility in aqueous environments. These compounds are classified under the Biopharmaceutical Classification System (BCS) as either class II or class IV substances. Different carriers were used to increase their solubility. Candesartan cilexetil (CC) is one of the most widely used antihypertensive drugs, which belongs to class II drugs. The aim of this research was to enhance the solubility and dissolution rate of CC through a complexation approach involving β-cyclodextrin and its derivatives, specifically hydroxypropyl beta cyclodextrin (HP-β-CD), methyl beta cyclodextrin (M-β-CD), and sulfonyl ether beta-cyclodextrin (SBE-β-CD), serving as
... Show MoreWe studied at the morphology, structural setup, and optical characteristics of thin cadmium (CdSe) films a thickness of 250 nm that were created by thermal evaporation over glass, The films exhibited a hexagonal shape were crystalline, and tended to form grains in the (111) crystallographic direction, according to the X-ray diffraction examinations. These characteristics were established using the investigation's findings. Through the use of thin films of CdSe doped with Ag at a concentration of 1.5%, the crystal structure orientations for pure CdSe (25.32, 41.84) and CdSe:Ag (25.39, 41.01) that were both pure as well as those that were doped with silver were both determined. The band gap of the optical spectrum decreased by 1.93–
... Show MorePositron annihilation lifetime (PAL) technique has been employed to
study the microstructural changes of polyurethane (PU), EUXIT 101
and epoxy risen (EP), EUXIT 60 by Gamma-ray irradiation with the
dose range (95.76 - 957.6) kGy. The size of the free volume hole and
their fraction in PU and EP were determined from ortho-positronium
lifetime component and its intensity in the measured lifetime spectra.
The results show that the irradiation causes significant changes in the
free volume hole size (Vh) and the fractional free volume (Fh), and
thereby the microstructure of PU and EP. The results indicate that
the γ-dose increases the crystallinity in the amorphous regions of PU
and increas
Optical properties of chromium oxide (Cr2O3) thin films which were prepared by pulse laser deposition method, onto glass substrates. Different laser energy (500-900) mJ were used to obtain Cr2O3 thin films with thickness ranging from 177.3 to 372.4 nm were measured using Tolansky method. Then films were annealed at temperature equal to 300 °C. Absorption spectra were used to determine the absorption coefficient of the films, and the effects of the annealing temperature on the absorption coefficient were investigated. The absorption edge shifted to red range of wavelength, and the optical constants of Cr2O3 films increases as the annealing temperature increased to 300 °C. X-ray diffraction (XRD) study reveals that Cr2O3 thin films are a
... Show MoreThis study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen
... Show MoreAccelerates operating managements in the facilities contemporary business environment toward redefining processes and strategies that you need to perform tasks of guaranteeing them continue in an environment performance dominated by economic globalization and the circumstances of uncertainty attempt the creation of a new structure through multiple pages seek to improve profitability and sustainable growth in performance in a climatefocuses on the development of institutional processes, reduce costs and achieve customer satisfaction to meet their demands and expectations are constantly changing. The research was presented structural matrix performance combines methodology Alsigma in order to improve customer satisfaction significantly bet
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreAlthough Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show MoreIn order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T