This work aims to investigate the integrated ultra-dense wavelength division multiplexing (UDWDM) and polarization division multiplexing (PDM) schemes incorporated in the free space optic (FSO) communication system. Erbium-doped fiber amplifiers (EDFAs) are used as post and pre-amplifiers in the proposed UDWDM–PDM–FSO system to boost the transmission power for increasing the distance. Thirty-two channels are transported over the FSO link to realize the total data transmission of 160 and 320 Gbps with 0.08 and 0.1 nm channel spacing, respectively. Results are also reported with non-return to zero modulation schemes. The performance of the proposed UDWDM–PDM–FSO transmission system is measured in terms of bit error rate (BER) and eye diagrams. The transmission distances are 100 and 87 km under clear weather and have acceptable BERs with 0.08 and 0.1 nm channel spacing, respectively. The weather conditions may worsen due to the increase in atmospheric turbulence. Hence, the transmission distances decrease to 3.93 and 2.6 km for heavy rain weather conditions. The UDWDM–PDM–FSO communication system exhibits an excellent performance due to the use of EDFAs with high achievable maximum distance and good and acceptable BER performance. The UDWDM–PDM–FSO communication system considerably enhances the transmission distance compared with the UDWDM–FSO communication system.
In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreIn recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreA fluorescence microscopy considered as a powerful imaging tool in biology and medicine. In addition to useful signal obtained from fluorescence microscopy, there are some defects in its images such as random variation in brightness, noise that caused by photon detection and some background pixels in the acquired fluorescence microscopic images appear wrongly auto-fluorescence property. All these practical limitations have a negative impact on the correct vision and analysis of the fluorescent microscope users. Our research enters the field of automation of image processing and image analysis using image processing techniques and applying this processing and analysis on one of the very important experiments in biology science. This research
... Show MoreThat the electronic payments system plays an important role in the effectiveness of commercial banks by attracting domestic or foreign investors, especially in the banking sector , It must keep abreast of global developments and technology in the field of banking that lead to the effectiveness of the bank by providing modern banking services and good customer service that improves the reputation of the bank, as well as develop its activities and promotes economic development at the country level , The technological progress of the bank will increase the speed of conducting banking operations, accuracy and safer , here should be laws and regulations related to electronic payment systems keep pace with the la
... Show MoreABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More