There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed for protecting information integrity when data is being transferred over a harsh communication medium. Hence, a separate channel coding protocol is often
Stroke is the second largest cause of death worldwide and one of the most common causes of disability. However, several approaches have been proposed to deal with stroke patient rehabilitation like robotic devices and virtual reality systems, researchers have found that the brain-computer interfaces (BCI) approaches can provide better results. In this study, the electroencephalography (EEG) dataset from post-stroke patients were investigated to identify the effects of the motor imagery (MI)-based BCI therapy by investigating sensorimotor areas using frequency and time-domain features and to select particular methods that help in enhancing the MI-based BCI systems for stroke patients using EEG signal processing. Therefore, to detect
... Show Morel
Big data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreAbstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de
... Show MoreIn this work, the surface of the telescope’s mirror is cleaned using an atmospheric-pressure radio frequency plasma jet (APRFPJ), which is generated by Argon gas between two coaxial metal electrodes. The RF power supply is set to 2 MHz frequencies with three different power levels: 20, 50, and 80 W. Carbon, that has adhered to the surface, can be effectively removed using the plasma cleaning technique, which also modifies any residual bonds. The cleaned surface was clearly distinguished using an optical emission spectroscopy (OES) technique and a water contact angle (WCA) analyzer for the activation property on their surfaces. The sample showed a super hydrophilic surface at an angle of 1° after 2.5 minutes of plasma tre
... Show MoreAn annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo
... Show More