This research aims to investigate and improve multi-user free space optic systems (FSO) based on a hybrid subcarrier multiplexing spectral amplitude coding-optical code division multiple access (SCM-SAC-OCDMA) technique using MS code with a direct decoding technique. The performance is observed under different weather conditions including clear, rain, and haze conditions. The investigation includes analyzing the proposed system mathematically using MATLAB and OptiSystem software. The simulation is carried out using a laser diode. Furthermore, the performances of the MS code in terms of angles of bit rate, beam divergence and noise are evaluated based on bit error rate (BER), received power, and transmission distance. The performance of the MS code-based system was subsequently compared with Khazani Syed code (KS), multi-diagonal (MD), and modified quadratic congruence code (MQC) codes under different weather conditions at a bit rate of 1 Gb/s and BER threshold of 10−9. Heavy rain indicates the worst performance in terms of transmission distance of 0.9 km. Nevertheless, the system designed using the MS code outperformed the KS, MD and MQC systems as it is capable of supporting up to 6.3, 0.8, 0.9, and 1.5 km, respectively, under clear weather. In conclusion, this study provides a means of improving FSO communications that suits tropical and Malaysia weather conditions.
Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreA perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after ca
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreSphingolipids are key components of eukaryotic membranes, particularly the plasma membrane. The biosynthetic pathway for the formation of these lipid species is largely conserved. However, in contrast to mammals, which produce sphingomyelin, organisms such as the pathogenic fungi and protozoa synthesize inositol phosphorylceramide (IPC) as the primary phosphosphingolipid. The key step involves the reaction of ceramide and phosphatidylinositol catalysed by IPC synthase, an essential enzyme with no mammalian equivalent encoded by the AUR1 gene in yeast and recently identified functional orthologues in the pathogenic kinetoplastid protozoa. As such this enzyme represents a promising target for novel anti-fungal and anti-protozoal drugs. Given
... Show MoreIn the hybrid coolingsolar systems , a solar collectoris used to convertsolar energy intoheat sourcein order to super heat therefrigerant leave thecompressor,andthisprocess helpsin the transformation ofrefrigerant state from gaseous statetothe liquid statein upper two-thirdsof thecondenserinstead of the lower two-thirdssuchas in thetraditional air-conditioning systems and this willreduce theenergyneeded torun the process ofcooling.In this research two hybrid air-conditioning system with an evacuated tube solar collector were used, therefrigerant was R22 and the capacity was 2 tons each.The tilt angle of the evacuated tube solar collector was changed and the solar collector fluid was replaced into oil instead of water.A comparison wasi
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More