Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the energy required by the drone to use the technology. A finite number of states have been designed to include a larger range of wireless network techniques, enabling the drones to be recognized while they are further away and in remote areas. This is achieved by including other means of RF channels, such as 4G/5G, Automatic Dependent Surveillance-Broadcast (ADS-B), long range Internet of things (IoT), and satellite communications, in the suggested ER-ID algorithm of this study. The introduced algorithm is tested via a case study. The results showed the ability to detect drones using all types of available radio frequency communication systems (RF-CS) while also minimizing the consumed energy. Hence, the authorities can control the licensed drones by using available RF-CS devices, such as Bluetooth and Wi-Fi, which are already widely used for mobile phones, as an example.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract
Background: The novel coronavirus 2 (SARS?CoV?2) pandemic is a pulmonary disease, which leads to cardiac, hematologic, and renal complications. Anticoagulants are used for COVID-19 infected patients because the infection increases the risk of thrombosis. The world health organization (WHO), recommend prophylaxis dose of anticoagulants: (Enoxaparin or unfractionated Heparin for hospitalized patients with COVID-19 disease. This has created an urgent need to identify effective medications for COVID-19 prevention and treatment. The value of COVID-19 treatments is affected by cost-effectiveness analysis (CEA) to inform relative value and how to best maximize social welfare through eviden
... Show MoreAbstract Background: The novel coronavirus 2 (SARS?CoV?2) pandemic is a pulmonary disease, which leads to cardiac, hematologic, and renal complications. Anticoagulants are used for COVID-19 infected patients because the infection increases the risk of thrombosis. The world health organization (WHO), recommend prophylaxis dose of anticoagulants: (Enoxaparin or unfractionated Heparin for hospitalized patients with COVID-19 disease. This has created an urgent need to identify effective medications for COVID-19 prevention and treatment. The value of COVID-19 treatments is affected by cost-effectiveness analysis (CEA) to inform relative value and how to best maximize social welfare through evidence-based pricing decisions. O
... Show MoreAutorías: Nuha Mohsin Dhahi, Ahmed Thare Hani, Muwafaq Obayes Khudhair. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2022. Artículo de Revista en Dialnet.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreA new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments
This study included the effect of Aged garlic extract (AgE) and Row garlic extract (RgE)as immune modulators for treating or redusing the infection of boiler by Gomboro. This is made of measuring the stress index and serum antibodies levels against Gomboro virous( GV) estimated by HI,the study also detected the effect of each extract as antioxidents in broiler by estimation of peroxynitrite in serum . 300 chicks infected with Gumboro diseas brought at day ( 21 ) old and divided into three groups , the first group A was given the ( RgE ) at level of 5% with drinking water , the group B was given 5% of ( AgE ) and group C is left as control group and wasn't given anything. &
... Show MorePeer-Reviewed Journal