61 research outputs found
An Algorithm for Fingerprint Classification Using Template Matching Technique
Automatic fingerprint classification has received considerable attention over the past
decade. Despite significant progress in this field, there are still rooms for improving
the classification operation by continuing study and research in this field. This thesis
describes a study of fingerprint classification using template matching technique. We
have classified the fingerprints in four groups according to their pattern, which are
Arch, Left loop, Right loop, and Whorl. We have discussed and explained the
specification and the limitations of the fingerprint classification (the effect of
corrupted and rotated input fingerprints on the accuracy of the classification
operation). The thesis has analysed the mentioned technique and evaluated its
strengths and limitation by comparing this technique with the singularities technique.
This research has also included the pre-processing stage, which consist of
enhancement, segmentation, and thinning of fingerprints
Challenges of hidden data in the unused area two within executable files
Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process
Mobility management in multicast environment
The communication in traditional network is unicast enabled by IP unicast protocol, on the contrary, group communication is the norm in human setting [1] and numerous
applications abound like Mobile TV, Multimedia and General Content Distribution and other collaborative applications [2]. However, point-to-point communication in such use cases of lecture delivery will waste bandwidth, and broadcast is not even a good option as recipients
should only be registered students and not all students. The only possible alternative is to employ multicasting
Theoretical analysis of triple-pass erbium-doped fiber amplifier
Many configurations of EDFA producing triple
pass EDFAs have been used, however, only two
configurations are commonly used in the optical fiber
communication system due to their high performance.
Those two configurations are configured in a double stage
EDFA. The first configuration is (configuration A) consists
of a single-pass EDFA as the first stage and a double-pass
EDFA as the second stage. The second configuration is
(Configuration B) which consists of a double-pass EDFA as
the first stage and a single-pass EDFA as the second stage.
The Literature shows the use of triple pass EDFA is either
with configuration A or configuration B and literature also
shows there is no theoretical analysis and comparison
between the performance of two Triple-pass EDFA
configurations A and B. This paper focus on the
performance analysis of both configurations A and B. The
importantance of this research is the theoretical analyses
that analyze the performance of those two configurations
and illustrate a comparison between them. This
comparison is important to show which of the two
configurations is more reliable in amplifying optical signal
for the fiber optic communication systems
Performance Analysis of a Free Space Optics Link with Multiple Transmitters/Receivers
ABSTRACT: Multiple transmitters/receivers (TX/RX) are used to improve the quality of Free Space Optics (FSO) communication systems. With the current needs of this technology for longer distance communication, the qualitative analysis of the system has become essential. In this work, the received power level (PR) and bit error rate (BER) are considered to influence the FSO link performance. The relationship between the two parameters are investigated and analysed. Furthermore, the received power for various numbers of TXs and RXs are experimentally measured and compared with the values obtained from theoretical calculations. The first part of the work deals with the theoretical calculation and simulation designs of multiple laser beams based on the commercial FSO used in actual sites. The second part describes the practical work and analysis of the system’s performance.
ABSTRAK: Pemancar/penerima berganda (TX/RX) digunakan bagi meningkatkan kualiti sistem komunikasi Ruang Optik Bebas (FSO). Analisis kualitatif ke atas sistemnya adalah penting bagi keperluan semasa teknologi ini untuk jarak jauh. Di dalam kajian ini, aras kuasa penerima (PR) dan kadar ralat bit (BER) telah diambilkira bagi menentukan prestasi rangkaian FSO. Hubungan di antara kedua-dua parameter telah dikaji dan dianalisis. Seterusnya, kuasa penerima untuk pelbagai nombor TXs dan RXs diukur secara eksperimen dan dibandingkan dengan nilai teori yang dikira. Bahagian pertama skop kajian berkaitan dengan pengiraan teori dan rekabentuk simulasi sinaran laser berdasarkan FSO komersial di lapangan. Bahagian kedua kajian adalah kerja lapangan dan analisis prestasi sistem.
KEY WORDS: Free Space Optics (FSO) link; Multiple TX/RX FSO; bit error rate (BER); eye diagram
Experimental Investigation of pump propagating direction in double-pass Er3+-doped fiber amplifiers
In this paper, the impacts of pump propagating direction in double-pass Erbium-doped fiber amplifier are experimentally demonstrated. The double-pass optical amplifier architecture is constructed using a fiber loop mirror that consists of a circulator to reflect the amplified signal back into the Erbium-doped fiber. The gain and noise figure performance of the double-pass optical amplifier is not affected by the direction of pump light, forward- or backward-pumped scheme. The population inversion along the Erbium-doped fiber is locked to a specific fraction due to the double-pass amplification of the signal
Design and performance analysis of multiple transmitters/receivers on Free Space Optics(FSO) link
Free Space Optics is the concept of transmitting very high bandwidth information using the optical beam from one point to another through the atmosphere. This technology offers
various advantages to both telecommunication users and providers. It provides a high data rates up to several Gbps, has immunity to radio frequency interferences, requires no licensing, gives a highly secured communication link due to the usage of a very narrow beam angle, and offers an inexpensive, fast and easy deployment when compared to the fiber optic installatio
- …