In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum method and Modified 2D-Checksum. In 2D-checksum method, summing process was done for 7×7 patterns in row direction and then in column direction to result 8×8 patterns. While in modified method, an additional parity diagonal vector was added to the pattern to be 8×9. By combining the benefits of using single parity (detecting odd number of error bits) and the benefits of checksum (reducing the effect of 4-bit errors) and combining them in 2D shape, the detection process was improved. By contaminating any sample of data with up to 33% of noise (change 0 to 1 and vice versa), the detecting process in first method was improved by approximately 50% compared to the ordinary traditional two dimensional-parity method and gives best detection results in second novel method
Background: Atherosclerosis is well known related to age and certain cardiovascular diseases. Aging is one reason of arteries function deterioration which can cause loss of compliance and plaque accumulation, this effect increases by the presence of certain diseases such as hypertension and diabetes disease. Aim: To investigate the reduction of blood supply to the brain in patients with diabetes and hypertension with age and the role of resistive index in the diagnosis of reduced blood flow. Method: Patients with both diseases diabetic and hypertension were classified according to their age to identify the progression of the disease and factors influencing the carotid artery blood flow. By using ultrasound and standard Doppler techniq
... Show MoreGas adsorption phenomenon on solid surface has been used as a mean in separation and purification of gas mixture depending on the difference in tendencies of each component in the gas mixture to be adsorbed on the solid surface according to its behaviour. This work concerns to study the possibilities to separate the gas mixture using adsorption-desorption phenomenon on activated carbon. The experimental results exhibit good separation factor at temperature of -40 .
The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreThe present research was conducted to synthesis Y-Zeolite by sol-gel technique using MWCNT (multiwalled carbon nanotubes) as crystallization medium to get a narrow range of particle size distribution with small average size compared with ordinary methods. The phase pattern, chemical structure, particle size, and surface area were detected by XRD, FTIR, BET and AFM, respectively. Results shown that the average size of Zeolite with and without using MWCNT were (92.39) nm and (55.17) nm respectively .Particle size range reduced from (150-55) nm to (130-30) nm. The surface area enhanced to be (558) m2/g with slightly large pore volume (0.231) km3/g was obtained. Meanwhile, degree of crystallization decrease
... Show MoreThe inhibitive action of Reactive Red (RR31) dye against corrosion of carbon steel in 1M acetic acid solution has been studied using gravimetric method at temperature ranged (288-318)K. The antibacterial activity for the different concentrations of RR31 dye against different bacterial species was studied. The experimental data indicates that this dye acts as a potential inhibitor for carbon-steel in acetic acid medium and the protection efficiency increase with increasing (RR31) dye. The adsorption of (RR31) dye on the carbon steel surface was found to follow Langmuir adsorption isotherm. Thermodynamic data for the adsorption process such as Gibbs free energy change ∆Gads, enthalpy change ∆Hads, and entropy change ∆Sads were estima
... Show MoreThe study relied on data about the health sector in Iraq in 2006 in cooperation with the Ministry of Health and the Central Bureau of Statistics and Information Technology in 2007 Included the estimates of the population distribution of the Baghdad province and the country depending on the population distribution for 1997,evaluate the health sector which included health institutions, and health staff, and other health services. The research Aimis; Measurement an amount and size of the growth of health services (increase and decrease) and the compare of verified in Iraq and Baghdad, and evaluate the effectiveness of the distribution of supplies and health services (physical and human) of the size of the population distribution and
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More