In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the BE
... Show MoreThe Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show MoreAbstract
One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.
In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
The coefficient of performance of a window type Air-Conditioner system can be improved if a reduction in the work of compressor can be achieved by a suitable technique. The present study investigates the effect of dispersing a low concentration of TiO2 nanoparticles in the mineral oil based lubricant, as well as on the overall performance of a window type Air-Conditioner system using R22 as the working fluid. An enhancement in the COP of the refrigeration system has been observed and the existence of an optimum volume fraction noticed, with low concentrations of nanoparticles suspended in the mineral oil. Results showed that the average compressor work reduced by 13.3%, which ultimately resulted in an increase of 11.99% in the COP due to
... Show MoreThis paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.
Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.
This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreBackground: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis. Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications. Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis. Conclusion: As new viruses emerge, diagnostic techniques advan
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More