In this paper, two elements of the multi-input multi-output (MIMO) antenna had been used to study the five (3.1-3.55GHz and 3.7-4.2GHz), (3.4-4.7 GHz), (3.4-3.8GHz) and (3.6-4.2GHz) 5G bands of smartphone applications that is to be introduced to the respective US, Korea, (Europe and China) and Japan markets. With a proposed dimension of 26 × 46 × 0.8 mm3, the medium-structured and small-sized MIMO antenna was not only found to have demonstrated a high degree of isolation and efficiency, it had also exhibited a lower level of envelope correlation coefficient and return loss, which are well-suited for the 5G bands application. From the fabrication of an inexpensive FR4 substrate with a 0.8 mm thickness level, a loss tangent of 0.035 and a dielectric constant of 4.3, the proposed MIMO antennas that had been simulated under the five different band coverage were discovered to have demonstrated a respective isolation level of about 14dB, 12dB, 21.5dB, 19dB and 20dB under a -10dB impendence bandwidth. In the measurement and fabrication outcomes that were derived from the use of the prototype MIMO in the (3.4-3.8) band of the Europe and Chinese markets, the proposed MIMO was thus found to have produced a better performance in terms of efficiency, isolation, and envelope correlation coefficient (ECC).
Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe study involved preparing a new compound by combining Schiff bases generated from compounds for antipyrine, including lanthanide ions (lanthanum, neodymium, erbium, gadolinium, and dysprosium). The preparation of the ligand from condensation reactions (4-antipyrinecarboxaldehyde with ethylene di-amine) at room temperature, and was characterization using spectroscopic and analytical studies ( FT-IR, UV-visible spectra, 1H-NMR, mass spectrometry, (C.H.N.O), thermogravimetric analysis (TGA), in addition to the magnetic susceptibility and conductivity measurement of the synthesis complexes, among the results we obtained from the tests, we showed that the ligand behaves with the (triple Valence) lanthanide ions, the multidentate
... Show MoreBackground: Complete denture wearers show lower levels of bite force than dentate subjects. This has a significant influence on their chewing efficiency. In this study an attempt was made to investigate the effect of the impression technique on the maximum bite force in complete denture wearers. Materials and methods: The patients selected for this research were 12 edentulous patients. Three different techniques for registering the final impression were made; the mucostatic, mucofunctional, and the selective pressure impression technique. Two sets of upper and lower denture bases and one set of upper and lower dentures were constructed for each subject. Intraoral and extraoral instruments and devices, as well as a computer program were used
... Show MoreThis paper reports a comprehensive study on the behavior of concavely curved soffit reinforced concrete (RC) beams strengthened in flexure with carbon fiber-reinforced polymer (CFRP) composites under static loading. The main objective of this paper is to explore the effect of surface concavity on the bond performance of externally bonded wet layup CFRP sheets and laminates. An experimental program consisting of flexural strengthening of 24 RC beams with concavely curved soffits was carried out. All specimens were simply supported RC beams tested under three-point bending. Of the 24 beams, 6 beams were flat soffit RC beams, and the remainder were fabricated with concavely curved soffits with a degree of curvature that is ranging from 5 mm/m
... Show MoreThis research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance
... Show MoreThe deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreThe problem of the current research addressed the close link between the psychological stress and social isolation as behavior and experience, as well as, the stress of the displaced pupils by the sense of alienation and isolation from the society to which they had moved. It reflects a sense of mystery to the displaced pupils about their lives in the present and future. Therefore, the current research aims to identify the psychological presence and the level of social isolation among secondary school displaced pupils and identify whether there were statistically significant differences in the variables between the displaced pupils (males-females). Moreover, it attempts to identify the relationship between psychological stress and social
... Show More