Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. The system was tested at communication distances of 1m and 3.5m using a terminal emulation program for data transfer between two computing devices.
The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreThe issue of communication and communication is receiving increasing attention in both contemporary studies and educational literature, and these studies emphasize the importance of studying communication within the classroom, which inevitably applies to the importance of relationships and tensions in the field of teaching art in particular because it is an emotional field that provides an opportunity for communication competencies and skills to be prominent and take Its wide scope, both among the students themselves and between teachers and students. The means of communication are the vessel in which the cultural relations and the commonalities between people revolve. The process of building relationships between students depends in man
... Show MoreIn this work, chemical spray pyrolysis deposition (CSP) technique was used to prepare a mixed In2O3-CdO thin films with different CdO content (10, 30 and 50)%volume ratio on glass substrates at 150 ᵒC substrate temperature. The surface morphology and structural properties were measured to find the optimum conditions to improve thin films properties for using as photo detector. Current –Time, the sensitivity and response speed vary for each mixture. Samples with 10% vol. CdO content has square pulse response with average rise time nearly 1s and fall time 1s.
The Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century
oday deep ocean life has not been discovered by humans including many secret world things to be explored. The researcher has focused on underwater optical wireless communications using various kinds of complex digital Signal processing most of them used in air and starting applied in underwater communication. The Internet of Things (IoT) uses underwater called Internet of Underwater Things (IoUT) applications to explore the underwater world with other devices. However, the difference in concentration between air and water surfaces is not easy making wireless communication more complicated. Visible light passes the water's surface with scattering and distortion inside the water and each color of light has different attenuation the blue laser
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show More