The synchronization of a complex network with optoelectronic feedback has been introduced theoretically, with use of 2×2 oscillators network; each oscillator considered is an optocoupler (LED coupled with photo-detector). Fixing the bias current (δ) and increasing the feedback strength (Ԑ) of each oscillator, the dynamical sequence like chaotic and periodic mixed mode oscillations has been observed. Synchronization of unidirectionally coupled of light emitting diodes network has been featured when coupling strength equal to 1.7×10-4. The transition between non-synchronization and synchronization states by means of the spatio-temporal distribution has been investigated.
Segmentation of urban features is considered a major research challenge in the fields of photogrammetry and remote sensing. However, the dense datasets now readily available through airborne laser scanning (ALS) offer increased potential for 3D object segmentation. Such potential is further augmented by the availability of full-waveform (FWF) ALS data. FWF ALS has demonstrated enhanced performance in segmentation and classification through the additional physical observables which can be provided alongside standard geometric information. However, use of FWF information is not recommended without prior radiometric calibration, taking into account all parameters affecting the backscatter energy. This paper reports the implementation o
... Show MoreA new optoelectronic flow injection method is proposed for the determination of ferrous ions (Fe 2+ ) based on thiocyanate complexation to form a deep-red FeSCN 2+ complex.
Objectives: Dickkopf-1 (DKK-1) is WNT/b-catenin pathway antagonist which plays a detrimental role in the development of diabetic retinopathy (DR). This research aimed to assess serum DKK-1 levels in diabetic patients who have and have not developed DR and, compare them with the control subjects finding out whether we can use it as an indicator for DR early diagnosis and to find out which one of the widely used two groups of antidiabetic treatments had the greater effect on this biomarker and hence on the progression of DR. Methods: The study participants were divided into two subgroups: First, 70 patients (36 male, 34 female) with type 2 diabetes mellitus, among them 35 patients diagnosed with DR and 35 with no evidence of DR, and s
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreThe pandemic SARS-CoV-2 is highly transmittable with its proliferation among nations. This study aims to design and exploring the efficacy of novel nirmatrelvir derivatives as SARS entry inhibitors by adapting a molecular modeling approach combined with theoretical design. The study focuses on the preparation of these derivatives and understanding their effectiveness, with a special focus on their binding affinity to the S protein, which is pivotal for the virus’s access to the host cell. Considering molecular docking aspects in the scope of a study on nirmatrelvir derivatives and S protein, dynamics simulations with 25 nanoseconds of their binding are explored. The study shows that these derivatives might work as effective antivi
... Show More