Real Time Extended (RTX) technology works to take advantage of real-time data comes from the global network of tracking stations together with inventor locating and compression algorithms to calculate and relaying the orbit of satellite, satellite atomic clock, and any other systems corrections to the receivers, which lead to real-time correction with high accuracy. These corrections will be transferred to the receiver antenna by satellite (where coverage is available) and by IP (Internet Protocol) for the rest of world to provide the accurate location on the screen of smartphone or tablet by using specific software. The purpose of this study was to assess the accuracy of Global Navigation Satellite System (GNSS) low-cost external antenna and possibility for using it with a smartphone to measure the points in Real Time Kinematic (RTK) and (RTX) modes, obtaining the same accuracy by using high-cost (GNSS) receiver with same modes. The assessment has applied through comparing the control points measured in static mode (3 to 5 hours) and corrected by Online Positioning User Service (OPUS) web-based processing software with same control points measured in RTX mode by GNSS low-cost external antenna (5 minutes). The results of an assessment were obtained horizontal and vertical location error in real time, by receiver getting the RTX correction data over the satellite link were RMS (east 41cm, north 35 cm, elevation 94 cm), that means it’s more suitable for automotive, agriculture, and forestry application, As for the RTK mode, the comparison of the differences in RTK mode between the two antennas were RMS (north 5 cm, east 6 cm, elevation 10). This result indicates that the GNSS low-cost external antenna might be very useful in accurate surveying application.
The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show More