Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …
In recent years, the iris biometric occupies a wide interesting when talking about
biometric based systems, because it is one of the most accurate biometrics to prove
users identities, thus it is providing high security for concerned systems. This
research article is showing up an efficient method to detect the outer boundary of
the iris, using a new form of leading edge detection technique. This technique is
very useful to isolate two regions that have convergent intensity levels in gray scale
images, which represents the main issue of iris isolation, because it is difficult to
find the border that can separate between the lighter gray background (sclera) and
light gray foreground (iris texture). The proposed met
In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv
... Show MoreEbastine (EBS) is a non-sedating antihistamine with a long duration of action. This drug has predominantly hydrophobic property causing a low solubility and low bioavailability. Surface solid dispersions (SSD) is an effective technique for improving the solubility and dissolution rate of poorly soluble drugs by using hydrophilic water insoluble carriers.
The present study aims to enhance the solubility and dissolution rate of EBS by using surface solid dispersion technique. Avicel® PH101, Avicel® PH 102, croscarmellose sodium(CCS) and sodium starch glycolate(SSG) were used as water insoluble hydrophilic carriers.
The SSD formulations of EBS were prepared by the solvent evaporation method in different drug: carrier
... Show MoreThis work aimed PVA nanofibers in a range of concentrations were successfully manufactured via electrospinning. PVA NFs/Si was effectively prepared using the electrospinning process. The structural, morphological, optical and electrical properties of the prepared PVA were studied using XRD, FE-SEM, UV-Vis spectrophotometer and I-V characteristics, respectively. The amorphous structure of PVA nanofibers was observed. The optical energy gap from ultraviolet to visible was between (2.75 and 2.41) eV, making this compound highly sensitive to visible orange light at 610 nm, with a photosensitivity of 66%. The optical energy gap of PVA/Si heterojunction was utilized to modify this film from the UV to the visible spectrum. As show in the results,
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MorePraise be to God, and may blessings and peace be upon the Messenger of God, his family and companions, and from his family and after ...
It is the right of every nation to be proud of its heritage, science and civilization among the nations, taking pride in the efforts of its construction and the keenness of its scholars and dedication to serve their nation and their history, and from the great sciences that boast and honor our great nation and distinguish it over others the science of attribution and the preservation of the novel over generations and ages. The novel is preserved from the plagiarism of the nullified, the excess of the deceitful and the liars, and the science of isnad from religion as the scholars said, and without the