he Orthogonal Frequency Division Multiplexing is a promising technology for the Next Generation Networks. This technique was selected because of the flexibility for the various parameters, high spectral efficiency, and immunity to ISI. The OFDM technique suffers from significant digital signal processing, especially inside the Inverse/ Fast Fourier Transform IFFT/FFT. This part is used to perform the orthogonality/De-orthogonality between the subcarriers which the important part of the OFDM system. Therefore, it is important to understand the parameter effects on the increase or to decrease the FPGA power consumption for the IFFT/FFT. This thesis is focusing on the FPGA power consumption of the IFFT/FFT uses in the OFDM system. This researc
... Show MoreUrea formaldehyde resin was prepared by using basic media by yield 95%. The Remaining of ureaplasts resin were prepared in acetic acid media by high yield. Alkyde resins were prepared by condensation polymerization by react Succinic, Maleic, Phthalic anhydrides with Ethylene glycol or Glycerol. Select samples of the prepared alkyde resins were mixed with Azo dyes in special ratio. The mixtures were used as coatings for wood, and compaised with pure dyes. The Coating that some alkyde resins showed better adhesion from using dyes alone. Preparation of wood coating by mixing ureaplast resins and alkyde resins with Azo dyes in special ratios. The coating showed better adhesion, brighter colors and better resistance to heat from Preceding coat
The research deals with a new type of high-performance concrete with improved physical properties, which was prepared by using metal additives minutes (Metakaolin) and by studing their impact on the properties of mortar and concrete high-performance through destructive and non destructive tests. This type of concrete is used broadly in public buildings and in other structures . The research involved a number of experiments such as finding the activity index of burned at a temperature of 750 º C according to the standard ( ASTM C-311/03), as well as casting models for the cubic mortar mixtures and concrete containers at different rates of metakaolin ranging between (5% - 20%) as an added part to the cement mix to get a high- compressive
... Show MoreThe present study introduces the concept of J-pure submodules as a generalization of pure submodules. We study some of its basic properties and by using this concept we define the class of J-regular modules, where an R-module M is called J-regular module if every submodule of M is J-pure submodule. Many results about this concept are proved
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreMost includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show MoreThe gaps and cracks in an image result from different reasons and affect the images. There are various methods concerning gaps replenishment along with serious efforts and proposed methodologies to eliminate cracks in diverse tendencies. In the current research work a color image white crack in-painting system has been introduced. The proposed inpainting system involved on two algorithms. They are Linear Gaps Filling (LGF) and the Circular Gaps Filling (CGF). The quality of output image depends on several effects such as: pixels tone, the number of pixels in the cracked area and neighborhood of cracked area and the resolution the image. The quality of the output images of two methods (linear method: average Peak Signal to Noise Ratio (PS
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show More