The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the sequences that will be recognized for next transmissions. In 2017 Code and Phase Hopping Techniques are both proposed to resolve the most recent problem in security-related, but not with FHSS, therefore in this paper presents a new composed proposed system will progress Phase Shift and Code Hopping in Code Division Multiplexing Access (CDMA) to complement with FHSS; because the wireless Communications systems security in the last years became a nightmare for some individuals, also companies, and even countries, also join them needing for higher bits rate in the wireless channels; because of next-generation communication system 5G-6G and the evolution in social networking, IoT, stream media, IoE, visualizations, and cloud computing. The new ideas can be applicable for a large number of users, also fast implementation without synchronization, as well as without any focus on encryption or keys-exchanges, at completion all results are simulation in MATLAB R2017b, the results have been tested by using 8 users in the same time, also our results showing promises effects on security for both applied systems Phases Shift and Codes Hopping especially the Code Hopping, therefor; our results encouraged us to complete research and compare our system with other.
Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,
... Show MoreMeta stable phase of SnO as stoichiometric compound is deposited utilizing thermal evaporation technique under high vacuum onto glass and p-type silicon. These films are subjected to thermal treatment under oxygen for different temperatures (150,350 and 550 °C ). The Sn metal transformed to SnO at 350 oC, which was clearly seen via XRD measurements, SnO was transformed to a nonstoichiometric phase at 550 oC. AFM was used to obtain topography of the deposited films. The grains are combined compactly to form ridges and clusters along the surface of the SnO and Sn3O3 films. Films were transparent in the visible area and the values of the optical band gap for (150,350 and 550 °C ) 3.1,
We report a new theranostic device based on lead sulfide quantum dots (PbS QDs) with optical emission in the near infrared wavelength range decorated with affibodies (small 6.5 kDa protein-based antibody replacements) specific to the cancer biomarker human epidermal growth factor receptor 2 (HER2), and zinc(II) protoporphyrin IX (ZnPP) to combine imaging, targeting and therapy within one nanostructure. Colloidal PbS QDs were synthesized in aqueous solution with a nanocrystal diameter of ∼5 nm and photoluminescence emission in the near infrared wavelength range. The ZHER2:432 affibody, mutated through the introduction of two cysteine residues at the C-terminus (
rop simulation models play a pivotal role in evaluating irrigation management strategies to improve water use in agriculture. The aim of this study is to verify the validity of the Aquacrop model of maize under the surface and sprinkler irrigation systems, and a cultivation system, borders and furrows, and for two varieties of Maze (Fajr and Drakma) At two different sites in Iraq, Babylon and Al-Qadisiyah governorates. An experiment was conducted to evaluate the performance of the Aquacrop model in simulating canopy cover (CC), biomass (B), dry yield, harvest index (HI), and water productivity (WP). The results of RMSE, R2, MAE, d, NSE, CC, Pe indicated good results and high compatibility between measured and simulated values. The highest a
... Show MoreThis work involves theoretical and experimental studies for seven compounds to calculate the electrons spectrum and NLO properties. The theoretical study is done by employing the Time Depending Density Functional Theory TD-DFT and B3LYP/high basis set 6-311++G (2d,2p), using Gaussian program 09. Experimental study by UV/VIS spectrophotometer device to prove the theoretical study. Theoretical and experimental results were applicable in spectrum and energy gap values, in addition to convergence theoretically the energy gap results from ΔEHOMO-LUMO and UV/VIS. spectrum. Consider the theoretical method very appropriate to compounds that absorb in vacuum UV.
To asses methylene blue as a cell marker, the cells of the buffy coat were labelled by incubating them in a medium containing a lable [Methylene blue] which is prepared in a concentration of 1%[1, 2, 3, 4, 5, 6] drops were tried at different periods of incubation [+/-,+/-, 1+/-, 1+/-] at 37 C degree. The results showed that monocytes and polymorphs are the main cells involved in the phagocytosis of this dye
Object tracking is one of the most important topics in the fields of image processing and computer vision. Object tracking is the process of finding interesting moving objects and following them from frame to frame. In this research, Active models–based object tracking algorithm is introduced. Active models are curves placed in an image domain and can evolve to segment the object of interest. Adaptive Diffusion Flow Active Model (ADFAM) is one the most famous types of Active Models. It overcomes the drawbacks of all previous versions of the Active Models specially the leakage problem, noise sensitivity, and long narrow hols or concavities. The ADFAM is well known for its very good capabilities in the segmentation process. In this
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreSome problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.