61 research outputs found

    An Algorithm for Fingerprint Classification Using Template Matching Technique

    Get PDF
    Automatic fingerprint classification has received considerable attention over the past decade. Despite significant progress in this field, there are still rooms for improving the classification operation by continuing study and research in this field. This thesis describes a study of fingerprint classification using template matching technique. We have classified the fingerprints in four groups according to their pattern, which are Arch, Left loop, Right loop, and Whorl. We have discussed and explained the specification and the limitations of the fingerprint classification (the effect of corrupted and rotated input fingerprints on the accuracy of the classification operation). The thesis has analysed the mentioned technique and evaluated its strengths and limitation by comparing this technique with the singularities technique. This research has also included the pre-processing stage, which consist of enhancement, segmentation, and thinning of fingerprints

    Challenges of hidden data in the unused area two within executable files

    Get PDF
    Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process

    Mobility management in multicast environment

    Get PDF
    The communication in traditional network is unicast enabled by IP unicast protocol, on the contrary, group communication is the norm in human setting [1] and numerous applications abound like Mobile TV, Multimedia and General Content Distribution and other collaborative applications [2]. However, point-to-point communication in such use cases of lecture delivery will waste bandwidth, and broadcast is not even a good option as recipients should only be registered students and not all students. The only possible alternative is to employ multicasting

    Theoretical analysis of triple-pass erbium-doped fiber amplifier

    Get PDF
    Many configurations of EDFA producing triple pass EDFAs have been used, however, only two configurations are commonly used in the optical fiber communication system due to their high performance. Those two configurations are configured in a double stage EDFA. The first configuration is (configuration A) consists of a single-pass EDFA as the first stage and a double-pass EDFA as the second stage. The second configuration is (Configuration B) which consists of a double-pass EDFA as the first stage and a single-pass EDFA as the second stage. The Literature shows the use of triple pass EDFA is either with configuration A or configuration B and literature also shows there is no theoretical analysis and comparison between the performance of two Triple-pass EDFA configurations A and B. This paper focus on the performance analysis of both configurations A and B. The importantance of this research is the theoretical analyses that analyze the performance of those two configurations and illustrate a comparison between them. This comparison is important to show which of the two configurations is more reliable in amplifying optical signal for the fiber optic communication systems

    Performance Analysis of a Free Space Optics Link with Multiple Transmitters/Receivers

    Get PDF
    ABSTRACT:  Multiple transmitters/receivers (TX/RX) are used to improve the quality of Free Space Optics (FSO) communication systems. With the current needs of this technology for longer distance communication, the qualitative analysis of the system has become essential. In this work, the received power level (PR) and bit error rate (BER) are considered to influence the FSO link performance. The relationship between the two parameters are investigated and analysed. Furthermore, the received power for various numbers of TXs and RXs are experimentally measured and compared with the values obtained from theoretical calculations. The first part of the work deals with the theoretical calculation and simulation designs of multiple laser beams based on the commercial FSO used in actual sites. The second part describes the practical work and analysis of the system’s performance. ABSTRAK: Pemancar/penerima berganda (TX/RX) digunakan bagi meningkatkan kualiti sistem komunikasi Ruang Optik Bebas (FSO). Analisis kualitatif ke atas sistemnya adalah penting bagi keperluan semasa teknologi ini untuk jarak jauh. Di dalam kajian ini, aras kuasa penerima (PR) dan kadar ralat bit (BER) telah diambilkira bagi menentukan prestasi rangkaian FSO. Hubungan di antara kedua-dua parameter telah dikaji dan dianalisis. Seterusnya, kuasa penerima untuk pelbagai nombor TXs dan RXs diukur secara eksperimen dan dibandingkan dengan nilai teori yang dikira. Bahagian pertama skop kajian berkaitan dengan pengiraan teori dan rekabentuk simulasi sinaran laser berdasarkan FSO komersial di lapangan. Bahagian kedua kajian adalah kerja lapangan dan analisis prestasi sistem. KEY WORDS:  Free Space Optics (FSO) link; Multiple TX/RX FSO; bit error rate (BER); eye diagram

    Experimental Investigation of pump propagating direction in double-pass Er3+-doped fiber amplifiers

    Get PDF
    In this paper, the impacts of pump propagating direction in double-pass Erbium-doped fiber amplifier are experimentally demonstrated. The double-pass optical amplifier architecture is constructed using a fiber loop mirror that consists of a circulator to reflect the amplified signal back into the Erbium-doped fiber. The gain and noise figure performance of the double-pass optical amplifier is not affected by the direction of pump light, forward- or backward-pumped scheme. The population inversion along the Erbium-doped fiber is locked to a specific fraction due to the double-pass amplification of the signal

    Design and performance analysis of multiple transmitters/receivers on Free Space Optics(FSO) link

    Get PDF
    Free Space Optics is the concept of transmitting very high bandwidth information using the optical beam from one point to another through the atmosphere. This technology offers various advantages to both telecommunication users and providers. It provides a high data rates up to several Gbps, has immunity to radio frequency interferences, requires no licensing, gives a highly secured communication link due to the usage of a very narrow beam angle, and offers an inexpensive, fast and easy deployment when compared to the fiber optic installatio
    corecore