In this paper, a theoretical investigation was suggested to study underwater wireless optical communication (UWOC) system based on multiple input–multiple output (MIMO) technique. The modulation schemes such as RZ-OOK, NRZ-OOK, 32-PPM and 4-QAM applied under different coastal water types. MIMO technique enabled the system to transmit data rate with longer distance link. The performance of the proposed system examined by BER and data rate as a metrics. Several impairments such as the types of water by the attenuation of coastal water and the distance link were taken into account for the transmission of the optical signal to appreciate the reliability of the MIMO technique. The theoretical analysis shows the proposed of MIMO (4Tx/4Rx) technique get the better performance compared with the other techniques in terms of BER. When 32-PPM is applied as a modulation scheme. For the system with MIMO technique the maximum distance link arrive to 14.9 and 2.9 m for coastal water types JIC and J9C, respectively. While SISO (1Tx/1Rx) technique achieved the maximum distance link are 10 and 2.3 m for coastal water types JIC and J9C, respectively. Therefore, 32-PPM can outperform the other modulation schemes and consider the suitable option for obtaining a low BER with the best maximum distance link for LoS of MIMO technique.
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreSolutions of dyes Rhodamine 6G (Rh6G) and Coumarin480(C480) were prepared at five concentrations (1x10-3, 5x10-4, 1x10-4, 5x10-5 and1x10-5) mol/l, the mixing was stirred to obtain on a homogenous solution, the(poly methyl-methacrylate) (PMMA) was solved by chloroform solvent with certain ratio, afterward (PMMA+Rh6G) and (PMMA+C480) thin films were prepared by casting method on glass block which has substrate with dimensions (7.5 x2.5)cm2, the prepared samples were left in dark place at room temperature for 24 hours to obtain uniform and homogenous thin films. UV-VIS absorption spectra, transmission spectra and fluorescence spectra were done to measure linear refractive index and linear absorption coefficient. The nonlinear optical proper
... Show Moresensor sampling rate (SSR) may be an effective and crucial field in networked control systems. Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur
... Show MoreThis work presents experimental research using draped prestressed steel strands to improve the load-carrying capacity of prestressed concrete non-prismatic beams with multiple openings of various designs. The short-term deflection of non-prismatic prestressed concrete beams (NPCBs) flexural members under static loading were used to evaluate this improvement. Six simply supported (NPCBs) beams, five beams with openings, and one solid specimen used as a reference beam were all tested as part of the experiment. All of the beams were subjected to a monotonic midpoint load test. The configuration of the opening (quadrilateral or circular), as well as the depth of the chords, were the varia
This work presents experimental research using draped prestressed steel strands to improve the load-carrying capacity of prestressed concrete non-prismatic beams with multiple openings of various designs. The short-term deflection of non-prismatic prestressed concrete beams (NPCBs) flexural members under static loading were used to evaluate this improvement. Six simply supported (NPCBs) beams, five beams with openings, and one solid specimen used as a reference beam were all tested as part of the experiment. All of the beams were subjected to a monotonic midpoint load test. The configuration of the opening (quadrilateral or circular), as well as the depth of the chords, were the varia
This paper is focused on orthogonal function approximation technique FAT-based adaptive backstepping control of a geared DC motor coupled with a rotational mechanical component. It is assumed that all parameters of the actuator are unknown including the torque-current constant (i.e., unknown input coefficient) and hence a control system with three motor control modes is proposed: 1) motor torque control mode, 2) motor current control mode, and 3) motor voltage control mode. The proposed control algorithm is a powerful tool to control a dynamic system with an unknown input coefficient. Each uncertain parameter/term is represented by a linear combination of weighting and orthogonal basis function vectors. Chebyshev polynomial is used
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThis study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show More