Do you want to publish a course? Click here

The process of transfer a speech signal by high confidentially and as quickly as possible through the Internet needs to develop compression and encryption technology for a speech signal, so as, to reduce its size and make it understandable to persons not authorized to listen to. A system was designed to encrypt the voice over Internet Protocol (VoIP) and use compression technique for the purpose of reducing the size of data and send it over the network, (A_law PCM) algorithm was used the to compress audio data. Then algorithms of Triple Data Encryption Standard (TDES) and Advanced. Encryption Standard (AES) were applied. A new encryption algorithm was proposed based in its work on the block cipher encryption system called the Direct and Reverse algorithm, which based on three basic steps, firstly expand the initial key, secondly direct the encryption of each round in one direction, and finally substitute (Bytes) as used in the Compensation Box in AES algorithm by making it moving. In general compression ratio was calculated and it was (50%) and the results of the correlation coefficient for the proposed algorithm was compared with the results of (AES, TDES) algorithms.
Wireless Multimedia Sensor Network (WMSN) consists of a large number of small size, low power, limited sources sensor nodes, deployed in tested field, These nodes have the ability of sensing, processing, storing and sending multimedia data from the t ested field in real time. The security in WMSNs is one of most important issues that should be studied due to the special nature of this network, and of the importance of inquest basic security requirements when sending information in the network. Using cryptography technics are very effective ways to realize basic security requirements in this network. The recently proposed MQQ algorithm is one of public key cryptography (PKC) algorithms, which provides a good performance compared to other PKC algorithms. In this research, we present an analyzing study of MQQ implementation in WMSNs. To achieve our goal, we used real images taken by multimedia wireless sensor nodes. We studied the most important parameters such as the size of generated keys and encrypted images, the execution time and the space occupied in the flash memory of multimedia wireless sensor nodes and complexity degree of this algorithm. Results showed that MQQ has good performance, as well as the execution time of operations is better than RSA algorithm. Results also showed the importance of taking into account a large size of public key of MQQ algorithm when implementation it in WMSNs.
Mobile Ad-Hoc Networks (MANETs) are infrastructure-less networks that are rapidly deployable and self-configuring and do not need central support. MANETs consist of a group of mobile nodes that act either as a router or as a host. Nodes in these netw ork move rapidly and randomly, causing a continuous change in network topology. The routing in the network and choosing the best path between nodes are major issues that attract the attention of researchers in the field of mobile networks, because of the importance of the routing process and its impact on network performance. This paper focuses on improving the performance of the proactive OLSR protocol in order to choose the best routing path that achieves the least time delay in the network, secures the best packet delivery rate and ensures reducing packet loss during the transmission process. The ant colony algorithm was used to choose the best path based on two main factors , namely the path length and the occupancy of the nodes within the path. Our simulation scenarios are built using NS2.35 to test the performance of the improved protocol in terms of increasing the number of nodes in the network and increasing the speed of nodes in the network. The test results show a reduction in the time delay in the network and an increase in the packet delivery rate.
Raimy (1999; 2000a; 2000b) proposed a graphical formalism for modeling reduplication, originallymostly focused on phonological overapplication in a derivational framework. This framework is now known as Precedence-based phonology or Multiprecedence p honology. Raimy's idea is that the segments at the input to the phonology are not totally ordered by precedence. This paper tackles a challenge that arose with Raimy's work, the development of a deterministic serialization algorithm as part of the derivation of surface forms. The Match-Extend algorithm introduced here requires fewer assumptions and sticks tighter to the attested typology. The algorithm also contains no parameter or constraint specific to individual graphs or topologies, unlike previous proposals. Match-Extend requires nothing except knowing the last added set of links.
Recently, a class of tracking techniques called "tracking by detection" has been shown to give promising results at real-time speeds. These methods train a discriminative classifier in an online manner to separate the object from the background. This classifier bootstraps itself by using the current tracker state to extract positive and negative examples from the current frame. Slight inaccuracies in the tracker can therefore lead to incorrectly labeled training examples, which degrade the classifier and can cause drift. In this paper, we show that usingSimple Online and Realtime Tracking (SORT) which is a pragmatic approach to multiple object tracking with a focus on simple, effective algorithms
This research deals with the modeling of a Multi-Layers Feed Forward Artificial Neural Networks (MLFFNN), trained using Gradient Descent algorithm with Momentum factor & adaptive learning rate, to estimate the output of the neural network correspon ding to the optimal Duty Cycle of DC-DC Boost Converter to track the Maximum Power Point of Photovoltaic Energy Systems. Thus, the DMPPT-ANN “Developed MPPT-ANN” controller proposed in this research, independent in his work on the use of electrical measurements output of PV system to determine the duty cycle, and without the need to use a Proportional-Integrative Controller to control the cycle of the work of the of DC-DC Boost Converter, and this improves the dynamic performance of the proposed controller to determine the optimal Duty Cycle accurately and quickly. In this context, this research discusses the optimal selection of the proposed MLFFNN structure in the research in terms of determining the optimum number of hidden layers and the optimal number of neurons in them, evaluating the values of the Mean square error and the resulting Correlation Coefficient after each training of the neural network. The final network model with the optimal structure is then adopted to form the DMPPT-ANN Controller to track the MPP point of the PV system. The simulation results performed in the Matlab / Simulink environment demonstrated the best performance of the proposed DMPPT-ANN controller based on the MLFFNN neural network model, by accurately estimating the Duty Cycle and improving the response speed of the PV system output to MPP access, , as well as finally eliminating the resulting oscillations in the steady state of the Power response curve of PV system compared with the use of a number of reference controls: an advanced tracking controller MPPT-ANN-PI based on ANN network to estimate MPP point voltage with conventional PI controller, a MPPT-FLC and a conventional MPPT-INC uses the Incremental Conductance technique INC
Mobile Wireless Sensor Network (MWSN) is an emerging technology for attraction of researchers with its research advantage and various application domains. Due to limited resources of sensor nodes such as transmission power, communication capability and size of memory, data aggregation algorithms are the most practical technique that reduces large amount of transmission in this network. Security is an important criterion to be considered because, wireless sensor nodes are deployed in a remote or hostile environment area that is prone to attacks easily. Therefore, security are essential issue for MWSN to protect information against attacks. In this research, we offered an algorithm of secure data aggregation in MWSN based on pair-wise keys technology and hash function. We studied important parameters such as execution time, end-to-end delay and number of storied keys. Results showed that
Quantum computing as a promising technology that solves impossible problems in classical computation due to its exponential complexity, superiority, barriers, hardware and software tools, in addition to the state of the art and future vision.
In this paper, it has merged two techniques of the artificial intelligent, they are the ants colony optimization algorithm and the genetic algorithm, to The recurrent reinforcement learning trading system optimization. The proposed trading system is based on an ant colony optimization algorithm and the genetic algorithm to select an optimal group of technical indicators, and fundamental indicators.
أصبح مفهوم الحوسبة السحابية من المفاهيم واسعة الانتشار والتي دخلت مختلف مجالات الحياة وقدمت فكرة مهمة هي نقل المعالجة والتخزين إلى مخدمات قابلة للمشاركة وبهذه الحالة يستطيع المستخدام أن يشغل تطبيقاته في اي مكان دون الخوف من فقدان البيانات أو من أيه مشكلة اخرى قد تطرأ على جهازه لان بياناته موجودة في مكان على الانترنت
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا