In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum method and Modified 2D-Checksum. In 2D-checksum method, summing process was done for 7×7 patterns in row direction and then in column direction to result 8×8 patterns. While in modified method, an additional parity diagonal vector was added to the pattern to be 8×9. By combining the benefits of using single parity (detecting odd number of error bits) and the benefits of checksum (reducing the effect of 4-bit errors) and combining them in 2D shape, the detection process was improved. By contaminating any sample of data with up to 33% of noise (change 0 to 1 and vice versa), the detecting process in first method was improved by approximately 50% compared to the ordinary traditional two dimensional-parity method and gives best detection results in second novel method
Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreInnovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high inj
... Show MoreTerrestrial Laser Scanning (TLS) can be used to detect damage and analyze volumetric changes in large structural test specimens. Compared to traditional imaging and surface analysis methods, the primary reason for using 3D scanning is the difficulty of attaching targets to towers of varying heights, as well as the fact that some towers are covered with insulating materials that obscure key landmarks. In addition, the large number of incoming and outgoing pipes and stairs attached to the towers further complicates traditional assessment methods. This research focuses on assessing the damage to the three refining towers at the Baiji Refinery facility. Scanning was performed using a 3D laser scanner with HDR color imaging, capturing da
... Show MoreIntegrated project delivery is collaboratively applying the skills and knowledge of all participants to optimize the project's results, increase owner value, decrease waste, and maximize efficiency during the design, fabrication, and construction processes. This study aims to determine IPD criteria positively impacting value engineering. To do this, the study has considered 9 main criteria according to PMP classification that already covers all project phases and 183 sub-criteria obtained from theoretical study and expert interviews (fieldwork). In this study, the SPSS (V26) program was used to analyze the main criteria and sub-criteria priorities from top to bottom according to their values of the Relative Importance In
... Show MoreAbstract:
Robust statistics Known as, resistance to errors caused by deviation from the stability hypotheses of the statistical operations (Reasonable, Approximately Met, Asymptotically Unbiased, Reasonably Small Bias, Efficient ) in the data selected in a wide range of probability distributions whether they follow a normal distribution or a mixture of other distributions deviations different standard .
power spectrum function lead to, President role in the analysis of Stationary random processes, form stable random variables organized according to time, may be discrete random variables or continuous. It can be described by measuring its total capacity as function in frequency.
<
... Show MoreIn this paper, we propose a new and efficient ferroelectric nanostructure metal oxide lithium niobate [(Li1.075Nb0.625Ti0.45O3), (LNTO)] solid film as a saturable absorber (SA) for modulating passive Q-switched erbium-doped fiber laser (EDFL). The SA is fabricated as a nanocomposite solid film by the drop-casting process in which the LNTO is planted within polyvinylidene fluoride-trifluoroethylene [P(VDF-TrFE)] as host copolymer. The optical and physical characteristics of the solid film are experimentally established. The SA is incorporated within the cavity of EDFL to examine its capability for producing multi-wavelength laser. The experimental results proved that a multi-wavelength laser is produced, where stable four lines with central
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show More