Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the energy required by the drone to use the technology. A finite number of states have been designed to include a larger range of wireless network techniques, enabling the drones to be recognized while they are further away and in remote areas. This is achieved by including other means of RF channels, such as 4G/5G, Automatic Dependent Surveillance-Broadcast (ADS-B), long range Internet of things (IoT), and satellite communications, in the suggested ER-ID algorithm of this study. The introduced algorithm is tested via a case study. The results showed the ability to detect drones using all types of available radio frequency communication systems (RF-CS) while also minimizing the consumed energy. Hence, the authorities can control the licensed drones by using available RF-CS devices, such as Bluetooth and Wi-Fi, which are already widely used for mobile phones, as an example.
This investigation was designed to determine the occurrence of intestinal parasites in fresh
vegetables(Apium graveolense, Lepidium aucheri and Allium porrum), from different markets
as a primary effort in Iraq. Eight genera and species of intestinal parasites appear in
vegetables, they were as follow: Echinococcus sp. 50%,Oxyuris equi 45%,Habronema sp.
45%,Parascaris equroum 31.6%,Strongyloides westrei 30%,Toxocara sp. 18.3%,Ascaris
lumbricoides 11.6% and Hymenolepis sp. 8.3% .The scarcity of fresh water has meant that
urban gardeners are increasingly irrigating their plots with wastewater. This poses a threat to
public health in addition of roaming dogs in open farms. All studied areas showed high rates
of eggs
The presence and prevalence of V. cholerae were investigated in forty five water samples collected from different locations of Tiger River/ Baghdad city. Twenty one isolates were isolated by adopting a simple isolation techniques. The final identification revealed that only three isolates were confirmed as V. cholerae. They were named 1J, 1R and Dial 131 which are all serogrouped as non-O1. Toxin Coregulated Pili (TCP) and heat labile enterotoxin (LT) were determined in only the environmental isolate 1J while non of the isolates produced heat stabile toxin (ST). The purification scheme was improved, few steps were adopted to include back extraction of ammonium sulfate, saturation between 80-20%, desalting through Sephadex G25, and gel filt
... Show MoreThe analysis of rigid pavements is a complex mission for many reasons. First, the loading conditions include the repetition of parts of the applied loads (cyclic loads), which produce fatigue in the pavement materials. Additionally, the climatic conditions reveal an important role in the performance of the pavement since the expansion or contraction induced by temperature differences may significantly change the supporting conditions of the pavement. There is an extra difficulty because the pavement structure is made of completely different materials, such as concrete, steel, and soil, with problems related to their interfaces like contact or friction. Because of the problem's difficulty, the finite element simulation is
... Show MoreThe mechanical properties of fiber-reinforced-polymer (FRP)
composites are dependent on the type amount, and orientation of fiber that is selected for a particular service. There are many commercially available reinforcement forms to meet the design requirements of the user. The ability of failure in the fiber architecture allows for optimized performance of a product that saves both weight and cost ( 12).
A modem technology is adopted to produce fibers (glass, kevelar,
and carbon) reinforced composite by using unsaturated polyester, where different volume fraction of these fibers are used (0, 0.2, 0.4, 0.6, 0.8, I)
reinfor
... Show MoreThis research investigates the adsorption isotherm and adsorption kinetics of nitrogen from air using packed bed of Li-LSX zeolite to get medical oxygen. Experiments were carried out to estimate the produced oxygen purity under different operating conditions: input pressure of 0.5 – 2.5 bar, feed flow rate of air of 2 – 10 L.min-1 and packing height of 9-16 cm. The adsorption isotherm was studied at the best conditions of input pressure of 2.5 bar, the height of packing 16 cm, and flow rate 6 Lmin-1 at ambient temperature, at these conditions the highest purity of oxygen by this system 73.15 vol % of outlet gas was produced. Langmuir isotherm was the best models representing the experimental data., and the m
... Show MoreLuffa aegyptiaca is a plant of multi-purpose importance whose usefulness cuts across virtually all areas of life. This study has characterized L. aegyptiaca in Lagos state and determined the mineral, proximate, phytochemical as well as the heavy metal accumulation potential. Samples were collected from the 20 Local Government Areas (LGAs) in Lagos state at 2 samples per location. Genetic similarity and intra-specific variation in 40 samples of L. aegyptiaca were determined using 3 Random Amplified Polymorphic DNA (RAPD) primers which yielded a total of 42 markers of which 25 was polymorphic. The maximum number of bands (14) was produced by OPC4 while the minimum (7) were produced by OPAF20. Percenta
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values