Preferred Language
Articles
/
BhevNY8BVTCNdQwCXmL3
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isolated from noise distortion. The modified method showed significant improvements in performance over traditional de-noising techniques.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Comparación entre el arte visual y la literatura; la adaptación de Orson Welles de El proceso de F. Kafka como ejemplo
...Show More Authors

RESUMEN:

Este estudio muestra una relación comparativa entre literatura y arte, concretamente entre las artes visuales (pintura y cine) y la literatura. Dicho estudio se puede clasificar dentro de los estudios actuales de literatura comparada. El interés por la cuestión viene por la problemática relación entre las dos artes, que tiene una larga tradición que se extiende desde el Ars poetica de Aristóteles hasta la aparición del vanguardismo en el siglo XX. La relación se presenta a través de los colores de las pinturas y los sonidos de las palabras. A los pintores de iconos se les conocía como iconógrafos porque se les consideraba más escritores que pintores. El icono era en realida

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Bioactivity of Gutta flow II versus Modified Gutta Percha based Silicon Endodontic Sealers by Nanobioactive Fillers
...Show More Authors

The success of endodontic therapy is relied on radicular system cleaning, shaping, elimination of micro-organisms, and three dimensional filling of the radicular complex.This study was conducted to develop and assess new root canal sealer incorporating nano-sized bioactive glass into Gutta Flow II. The following concentration was used depend on a pilot study included adding (3%) of 45S5 bioactive glass into the Gutta Flow II. These materials were tested through assessment bioactivity. bioactivity test was undertaken after immersion of the tested samples into PBS for three days, seven days, fourteen days, and twenty eight days using FTIR too. study was found that it’s peaks was appear at level 800-1000 cm-1. The results showed that GFII gr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Ceramics International
High-performance (K,Na)NbO3-based binary lead-free piezoelectric ceramics modified with acceptor metal oxide
...Show More Authors

View Publication
Scopus (31)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Sat Aug 25 2012
Journal Name
Wireless Personal Communications
Multi-Objective Evolutionary Algorithm Based on Decomposition for Energy Efficient Coverage in Wireless Sensor Networks
...Show More Authors

Scopus (57)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Advanced Computer Science And Applications
Fast Hybrid String Matching Algorithm based on the Quick-Skip and Tuned Boyer-Moore Algorithms
...Show More Authors

View Publication
Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Modern Trends In Engineering And Research
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors

Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Robust Watermarking Scheme for GIS Vector Maps
...Show More Authors

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Sub–Nyquist Frequency Efficient Audio Compression
...Show More Authors

This paper presents the application of a framework of fast and efficient compressive sampling based on the concept of random sampling of sparse Audio signal. It provides four important features. (i) It is universal with a variety of sparse signals. (ii) The number of measurements required for exact reconstruction is nearly optimal and much less then the sampling frequency and below the Nyquist frequency. (iii) It has very low complexity and fast computation. (iv) It is developed on the provable mathematical model from which we are able to quantify trade-offs among streaming capability, computation/memory requirement and quality of reconstruction of the audio signal. Compressed sensing CS is an attractive compression scheme due to its uni

... Show More
View Publication Preview PDF