Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CNN infrastructure. Findings: The results acquired through the investigated CBIR system alongside the benchmarked results have clearly indicated that the suggested technique had the best performance with the overall accuracy at 88.29% as opposed to the other sets of data adopted in the experiments. The outstanding results indicate clearly that the suggested method was effective for all the sets of data. Improvements/Applications: As a result of this study, it was found the revealed that the multiple image representation was redundant for extraction accuracy, and the findings from the study indicated that automatically retrieved features are capable and reliable in generating accurate outcomes.
Multi-carrier direct sequence code division multiple access (MC-DS-CDMA) has emerged recently as a promising candidate for the next generation broadband mobile networks. Multipath fading channels have a severe effect on the performance of wireless communication systems even those systems that exhibit efficient bandwidth, like orthogonal frequency division multiplexing (OFDM) and MC-DS-CDMA; there is always a need for developments in the realisation of these systems as well as efficient channel estimation and equalisation methods to enable these systems to reach their maximum performance. A novel MC-DS-CDMA transceiver based on the Radon-based OFDM, which was recently proposed as a new technique in the realisation of OFDM systems, will be us
... Show MoreInternet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show MoreIn this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the BE
... Show MoreDeveloping and researching antenna designs are analogous to excavating in an undiscovered mine. This paper proposes a multi-band antenna with a new hexagonal ring shape, theoretically designed, developed, and analyzed using a CST before being manufactured. The antenna has undergone six changes to provide the best performance. The results of the surface current distribution and the electric field distribution on the surface of the hexagonal patch were theoretically analyzed and studied. The sequential approach taken to determine the most effective design is logical, and prevents deviation from the work direction. After comparing the six theoretical results, the fifth model proved to be the best for making a prototype. Measured results rep
... Show MoreA total number of 68 water samples was revealed 20 isolates being Staphylococcus aureus. Irrigation water isolates represented 25% of isolates while wastewater 75%. all isolates were identified by morphological, microscopial, biochemical tests and VITEK®2 Compact. Bacterial isolates were subjected to 16 antibiotics, all irrigation water and wastewater isolates were resistant to penicillin while they were fully sensitive to Ciprofloxcin. Irrigation water isolates showed relatively greater multi-drug resistance than wastewater, wherein irrigation water isolates showed 100% multi-drug resistance while wastewater isolates showed 73.3% multi-drug resistance, indicating the ability of S. aureus MDR to move from one site to another, which means t
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i
... Show MoreDue to the energy crisis and the stringent environmental regulations, diesel engines are offering good hope for automotive vehicles. However, a lot of work is needed to reduce the diesel exhaust emissions and give the way for full utilization of the diesel fuel’s excellent characteristics.
A kind of cetane number improver has been proposed and tested to be used with diesel fuel as ameans of reducing exhaust emissions. The addition of (2-ethylhexyl nitrate) was designed to raise fuel cetane number to three stages, 50, 52 and 55 compared to the used conventional diesel fuel whose CN was 48.5. The addition of CN improver results in the decre
... Show More