The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) with 2×1 and 2×2 Alamouti schemes for different chaotic maps over wireless channels has been studied. It has been shown that the use of these schemes can …
In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
Various speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThis paper proposed a new approach for an underwater visible light communication (UVLC) system using MIMO (2Tx/2Rx) technology. The BER performance, Q-factor, and data rate of the UVLC system are looked at in coastal waters of the Jerov type (J1C, J3C, J5C, J7C, and J9C). The applied system takes into account the angles ranging from 0 to 15° and 45°. The results indicated that 32-PPM outperformed other modulation techniques.
This paper proposed a theoretical treatment to study underwater wireless optical communications (UWOC) system with different modulation schemes by multiple input-multiple output (MIMO) technology in coastal water. MIMO technology provides high-speed data rates with longer distance link. This technique employed to assess the system by BER, Q. factor and data rate under coastal water types. The reliability of the system is examined by the techniques of 1Tx/1Rx, 2Tx/2Rx, 3Tx/3Rx and 4Tx/4Rx. The results shows the proposed technique by MIMO can get the better performance compared with the other techniques in terms of BER. Theoretical results were obtained to compare between PIN and APD
The efficient exploitation of production inventory systems is of significant importance in the modern industrial reality. This paper explores the effect of such a system on dynamic behaviour of a system when the control is provided synergistically by a method called synergetic control (SC). The mathematical model of the system is first constructed and SC introduced to improve the responsiveness of the system when the time-varying demand condition is taken into account. To cope with the problem of unavailability of the systems' state signals and to estimate the demand, the extended state observer (ESO) is introduced. Moreover, mountain gazelle optimizer (MGO) is employed to tune the adjustable design parameters of the SC and the ESO based on
... Show More