31 research outputs found

    Design and Analysis of Circular Polarized Two-Port MIMO Antennas with Various Antenna Element Orientations

    Get PDF
    This article presents the circularly polarized antenna operating over 28 GHz mm-wave applications. The suggested antenna has compact size, simple geometry, wideband, high gain, and offers circular polarization. Afterward, two-port MIMO antenna are designed to get Left Hand Circular Polarization (LHCP) and Right-Hand Circular Polarization (RHCP). Four different cases are adopted to construct two-port MIMO antenna of suggested antenna. In case 1, both of the elements are placed parallel to each other; in the second case, the element is parallel but the radiating patch of second antenna element are rotated by 180°. In the third case, the second antenna element is placed orthogonally to the first antenna element. In the final case, the antenna is parallel but placed in the opposite end of substrate material. The S-parameters, axial ratio bandwidth (ARBW) gain, and radiation efficiency are studied and compared in all these cases. The two MIMO systems of all cases are designed by using Roger RT/Duroid 6002 with thickness of 0.79 mm. The overall size of two-port MIMO antennas is 20.5 mm × 12 mm × 0.79 mm. The MIMO configuration of the suggested CP antenna offers wideband, low mutual coupling, wide ARBW, high gain, and high radiation efficiency. The hardware prototype of all cases is fabricated to verify the predicated results. Moreover, the comparison of suggested two-port MIMO antenna is also performed with already published work, which show the quality of suggested work in terms of various performance parameters over them

    A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation

    No full text
    As an essential cryptological element, symmetric-key block ciphers have long been utilized to offer information security. Even though they were created to provide data confidentiality, their adaptability grants them to be utilized in the creation of various cryptological techniques, including message authentication protocols, hash functions, and stream cryptograms. MARS is a symmetric shared-key block cryptosystem that supports 128-bit blocks and keys with sizes ranging from 128 to 448 bits. The cryptographic cores of MARS come in a variety of rounds, each constructed to take benefit of the robust outcomes in order to enhance security and performance over earlier ciphers. The MARS cipher is given a new function in this work that uses the operations ROT, XOR, NOP, INV, hash 512, Quotient, and MOD for improving the technique of the cipher. The goal of our modification is attaining a superior confusion level whilst retaining the MARS cryptosystem’s differential and linearity aspects

    A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation

    No full text
    As an essential cryptological element, symmetric-key block ciphers have long been utilized to offer information security. Even though they were created to provide data confidentiality, their adaptability grants them to be utilized in the creation of various cryptological techniques, including message authentication protocols, hash functions, and stream cryptograms. MARS is a symmetric shared-key block cryptosystem that supports 128-bit blocks and keys with sizes ranging from 128 to 448 bits. The cryptographic cores of MARS come in a variety of rounds, each constructed to take benefit of the robust outcomes in order to enhance security and performance over earlier ciphers. The MARS cipher is given a new function in this work that uses the operations ROT, XOR, NOP, INV, hash 512, Quotient, and MOD for improving the technique of the cipher. The goal of our modification is attaining a superior confusion level whilst retaining the MARS cryptosystem’s differential and linearity aspects

    Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption

    No full text
    Digital Signature using Self-Image signing is introduced in this paper. This technique is used to verify the integrity and originality of images transmitted over insecure channels. In order to protect the user’s medical images from changing or modifying, the images must be signed. The proposed approach uses the Discrete Wavelet Transform to subdivide a picture into four bands and the Discrete Cosine Transform DCT is used to embed a mark from each sub-band to another sub-band of DWT according to a determined algorithm. To increase the security, the marked image is then encrypted using Double Random Phase Encryption before transmission over the communication channel. By verifying the presence of the mark, the authority of the sender is verified at the receiver. Authorized users’ scores should, in theory, always be higher than illegal users’ scores. If this is the case, a single threshold might be used to distinguish between authorized and unauthorized users by separating the two sets of scores. The results are compared to those obtained using an approach that does not employ DWT

    Correcting Errors in Color Image Encryption Algorithm Based on Fault Tolerance Technique

    No full text
    Security standards have been raised through modern multimedia communications technology, which allows for enormous progress in security. Modern multimedia communication technologies are concerned with fault tolerance technique and information security. As a primary method, there is widespread use of image encryption to protect image information security. Over the past few years, image encryption has paid more attention to combining DNA technologies in order to increase security. The objective here is to provide a new method for correcting color image encryption errors due to the uncertainty of DNA computing by using the fractional order hyperchaotic Lorenz system. To increase randomness, the proposed cryptosystem is applied to the three plain image channels: Red, Green, and Blue. Several methods were compared including the following: entropy, correlation, key sensitivity, key space, data loss attacks, speed computation, Number of Pixel changing rate (NPCR), and Unified Average Change Intensity randomness (UACI) tests. Consequently, the proposed scheme is very secure against a variety of cryptographic attacks

    A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion

    No full text
    Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz diffusion stage and DNA confusion stage. It involves two identical encryption and decryption algorithms, which simplifies the implementation of transmitting and receiving schemes of images securely as a bijective system. Both schemes utilize two distinctive non-consecutive chaotic diffusion stages and one DNA scrambling stage in between. The generation of the coded secret bit stream employs a hybrid chaotic system, which is employed to encrypt or decrypt the transmitted image and is utilized in the diffusion process to dissipate the redundancy in the original transmitted image statistics. The transmitted image is divided into eight scrambled matrices according to the position of the pixel in every splitting matrix. Each binary matrix is converted using a different conversion rule in the Watson–Crick rules. The DNA confusion stage is applied to increase the complexity of the correlation between the transmitted image and the utilized key. These stages allow the proposed image encryption scheme to be more robust against chosen/known plaintext attacks, differential attacks, cipher image attacks, and information entropy. The system was revealed to be more sensitive against minimal change in the generated secret key. The analysis proves that the system has superior statistical properties, bulkier key space, better plain text sensitivity, and improved key sensitivity compared with former schemes

    A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences

    No full text
    Multimedia encryption innovation is one of the primary ways of securely and privately guaranteeing the security of media transmission. There are many advantages when utilizing the attributes of chaos, for example, arbitrariness, consistency, ergodicity, and initial condition affectability, for any covert multimedia transmission. Additionally, many more benefits can be introduced with the exceptional space compliance, unique information, and processing capability of real mitochondrial deoxyribonucleic acid (mtDNA). In this article, color image encryption employs a confusion process based on a hybrid chaotic map, first to split each channel of color images into n-clusters; then to create global shuffling over the whole image; and finally, to apply intrapixel shuffling in each cluster, which results in very disordered pixels in the encrypted image. Then, it utilizes the rationale of human mitochondrial genome mtDNA to diffuse the previously confused pixel values. Hypothetical examination and trial results demonstrate that the anticipated scheme exhibits outstanding encryption, as well as successfully opposes chosen/known plain text, statistical, and differential attacks

    Fully Differential Current-Mode Configuration for the Realization of First-Order Filters with Ease of Cascadability

    No full text
    It is well known that fully differential signal processing is more advantageous than single-ended signal processing in a noisy environment, and is widely used in audio, video and other signal processing applications. This paper introduces a new fully differential configuration that contains a first-order low-pass (LP) filter, high-pass (HP) filter, and all-pass (AP) filter, all present within the same circuit design. The proposed fully differential configuration is simple and employs only one multiple-output current differencing transconductance amplifier and one grounded capacitor. The circuit has a wide operating frequency range (up to 73 MHz). The additional features offered by the proposed circuit include use of the lowest number of active and passive components, suitability of the integrated circuit chip, support of cascadability, electronic tunability, no passive component-matching restrictions, availability of all first-order responses, i.e., LP, HP, and AP, and low-level operating supply voltages. Non-ideal and parasitic analyses are investigated for the proposed circuit, and PSPICE simulation results are presented to verify the proposed theory. Additionally, the proposed fully differential LP filter circuit is experimentally verified using off-the-shelf ICs. Moreover, the cascading feasibility is demonstrated by realizing a fully differential nth-order LP filter

    Self-decoupled tri band MIMO antenna operating over ISM, WLAN and C-band for 5G applications

    No full text
    For ISM, WLAN, and C-band applications, a multiple-stub loaded CPW feed tri-band antenna is presented in this study. The suggested antenna uses Rogers RT/Duroid 5880 substrate material with a 0.79 mm thickness. The antenna has a straightforward design, measures just 33 mm × 20 mm, and provides broad performance with excellent gain. A 4-port MIMO arrangement is subsequently used to fulfill the demands of upcoming 5G and 6G devices. The MIMO antenna contains little space between elements and offers a good value of < –30 dB isolation. The overall size of a 4-port MIMO antenna is MW × ML × H = 60 mm × 60 mm × 0.79 mm and offers a minimum value of ECC <0.0001. Besides ECC, the MIMO antenna also offers good results in terms of DG, CCL, and MEG. To validate the findings of the simulation, a hardware prototype of the suggested antenna is created. It is clear that the results from simulations and measurements coincide well. The proposed antenna was created with the aid of the software tool Ansoft HFSSv9. Also, the proposed work is evaluated against previously published material. The suggested antenna has a small size, a simple geometry, a wideband, high gain, and a good value for the MIMO parameters, according to the results and comparisons of the proposed work (in terms of ECC, DG, CCL, and MEG), and low spacing between elements, which makes it a promising candidate for future 5G devices operating over ISM, WLAN, and C–band applications

    Lightweight Hybrid Deep Learning Architecture and Model for Security in IIOT

    No full text
    Remarkable progress in the Internet of Things (IoT) and the requirements in the Industrial era have raised new constraints of industrial data where huge data are gathered by heterogeneous devices. Recently, Industry 4.0 has attracted attention in various fields of industries such as medicines, automobiles, logistics, etc. However, every field is suffering from some threats and vulnerabilities. In this paper, a new model is proposed for detecting different types of attacks and it is analyzed with a deep learning technique, i.e., classifier-Convolution Neural Network and Long Short-Term Memory. The UNSW NB 15 dataset is used for the classification of various attacks in the field of Industry 4.0 for providing security and protection to the different types of sensors used for heterogeneous data. The proposed model achieves the results using Cortex processors, a 1.2 GHz processor, and four gigabytes of RAM. The attack detection model is written in Python 3.8.8 and Keras. Keras constructs the model using layers of Convolutional, Max Pooling, and Dense Layers. The model is trained using 250 batch size, 60 epochs, 10 classes. For this model, the activation functions are Relu and softmax pooling
    corecore