A theoretical study to design a conformal microstrip antennas was introduced in this work. Conformal microstrip antennas define antennas which can be conformed to a certain shape or to any curved surface. It is used in high-speed trains, aircraft, defense and navigation systems, landing gear and various communications systems, as well as in body wearable. Conformal antennas have some advantages such as a wider-angle coverage compared to flat antennas and low radar cross-sectional (RCS) and they are suitable for using in Radome. The main disadvantage of these antennas is the narrow bandwidth. The FDTD method is extremely useful in simulating complicated structures because it allows for direct integration of Maxwell's equations depending on time. The 1x2 cylindrical circular microstrip antennas array is designed and simulated vertically via Finite Difference Time Domain (FDTD) method where can directive antenna be achieved through antennas array design. Mutual coupling between the antennas in the array and the different separation between them were studied. The circular patch is excited by a probe feed method for several reasons including providing less spurious radiation from the probe current, in addition to the simplicity in theoretical engineering installation and practical manufacturing. It is well known that the values of the coupling are decreased as the distance separation increased. Cylindrical circular microstrip antenna with resonant frequency operating is 3.5GHz for mode, several parameters like return loss, band width, and input impedance are calculated. Also, for isolated coupling, mutual coupling coefficients, directivity gain, for different separations between the centers of the two adjacent circular patches in terms the wave length operating are calculated. Moreover, the electromagnetic band gap EBG structure is used for reducing the mutual coupling created by the surface waves in order to enhance the antenna's performance in an array has become smaller than before. The proposed EBG is a three triangular-shape equal sides metallic structure, utilizing the inter-element spacing in an array. The less value of for the spacing between the two centers of patches is . BW percentage increased to 34.3% and the directivity is enhanced also. Additionally, simulations were done using MATLAB 2017b.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIn this study abundance and composition of zooplanktons in the Indus River Estuary was conducted to examine habitat characteristics and its impact on tiny organisms. Overall 30,656 individuals were identified and segregated into seven major groups including Copepods, Cnidarians, Decapods, Mollusk, Pisces, Amphipods and Chaetognaths. For better understanding they were further divided into eighteen planktonic categories. Among them Lucifer spp. comprises of 52.21% was the most abundant group with a peak appeared in March whereas Chaetognaths were rarely observed in the entire study period. Species diversity exhibited a mixed trend with the highest values (0.776) of dominance observed in spring (March). The results of Canonical Corresponden
... Show Moreis divided into two chapter:Chapter one to ensure asyslematic framework for research amd included aresearch problem and also inchuded on the importance of research and the need for him as well as to clarify. The second chapter inchuded a theoretical framework: theoretical framework has been divided into two section. The first topic: poetics transformations The second topic: poetics and scale of rheloric in the film After the comp of the theoretical framework; so the researcher analyzed the film (Antichrist) has arrived ataset of resuits was including
The research topic (The dramatic structure transformations in the Iraqi Feature Film) studies the dramatic structure and its transformations in the Iraqi feature film. The research determined the research problem and the need for it in addition to the aims and the limits of the study as well as its importance. The theoretical framework consists of the following themes: the dramatic transformations mechanism and dramatic data in the Iraq film 1957-2003 then the dramatic values transformations and the performance contradictions in the Iraqi film.
The research, after concluding the theoretical framework, came up with a number of indicators of the theoretical framework that have been used as a tool to analyze the sample. The research proc
Roughness length is one of the key variables in micrometeorological studies and environmental studies in regards to describing development of cities and urban environments. By utilizing the three dimensions ultrasonic anemometer installed at Mustansiriyah university, we determined the rate of the height of the rough elements (trees, buildings and bridges) to the surrounding area of the university for a radius of 1 km. After this, we calculated the zero-plane displacement length of eight sections and calculated the length of surface roughness. The results proved that the ranges of the variables above are ZH (9.2-13.8) m, Zd (4.3-8.1) m and Zo (0.24-0.48) m.