40 research outputs found

    COMPARING DISPERSION COMPENSATION METHODS FOR 120 GB/S OPTICAL TRANSMISSION: PRE, POST, AND SYMMETRICAL SCHEMES

    Get PDF
    One of the major factors that limit the performance of an optical fiber communication system isdispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communication system at 120 Gbps Return to Zero (RZ) signal launched over Single-Mode Fiber (SMF) of 100 km by using OptiSystem 7.0 software.

    Secure Wireless Infrastructure Network Using Access Point Checking

    Get PDF
    Developments in computers, communication and networks has opened up the doors for wireless network evolution which enjoys attractive features such as dynamic communication and the ease of members to join the network. Improvements in wireless technology has increased the needed for more complicated security systems, where data security and protection represent main wireless networks features. In distributed systems, the use of networks and standard communication protocols facilitate data transmission between a terminal user and a computer - and between a computer and another computer. Network security measures the need to protect data during transmission. Clearly, wireless networks are less secure compared to wired networks. So, the most important question here is how to protect data transmission in wireless networks. In this work, we briefly glance at network classes and existing security mechanisms. We then propose our new access point checking algorithm to increase security over infrastructure wireless networks. The goal is to save the time consumed during message travel from one host to another in the network, while maintaining message security. We employ a checksum mechanism to enhance message integrity. In addition, access point (AP) will check the message and decide whether the message should be sent back to the original sender or not. Experimental results for different networking scenarios are provided to validate the system ability. Our technique outperforms traditional security mechanisms in terms of timing characteristics

    Impact of COVID-19 pandemic on education: Moving towards e-learning paradigm

    Get PDF
    Besides the economic impact and loss of jobs and revenues, COVID-19 have a great impact on the education sector, with several learning institutions across the world remaining shut down for months. This study evaluated the impact of COVID-19 pandemic on education. The study employed a cross-sectional study design in which data was collected using qualitative methods from various education stakeholders as well as secondary literature. The result showed that learning has severely been affected by the strict protocols adopted by various governments in response to COVID-19 pandemic. The major responses to COVID-19 like closing up schools have left most learners hopeless as they cannot afford the recommended online learning. The major responses to COVID-19 at the few operating schools include: wearing masks, hand sanitization, regular hand washing, constant temperature check for both staff and learners, and lastly change on the sitting arrangements as students are required to maintain a social distance of at least 1.5 meters. Moreover, closure of schools has also had a severe impact on the co-curricular activities that are always undertaken within the academic institutions like athletics, drama and ball games. Measures should be put in place by various governments to ensure that all learners have access to equitable, quality and inclusive forms of education during the present COVID-19 pandemic

    Steganography in Arabic Text Using Full Diacritics Text

    Get PDF
    The need for secure communications has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new Steganogaphy algorithm for Arabic text. The algorithm employs some Arabic language characteristics, which represent as small vowel letters. Arabic Diacritics is an optional property for any text and usually is not popularly used. Many algorithms tried to employ this property to hide data in Arabic text. In our method, we use this property to hide data and reduce the probability of suspicions hiding. Our approach uses a performance metric involves the file size before and after adding Diacritics and ability to hide data with being suspicious

    Steganography in Text by Merge ZWC and Space Character

    Get PDF
    Secure communication is essential for data confidentiality and integrity especially with the massive growth of the internet and mobile communication. Steganography is an art for data hiding by embedding the data to different objects such as text, images, audio and video objects. In this paper we propose a new algorithm for data hiding using Text Steganography in Arabic language. Our algorithm uses the Zero Width Character from Unicode (U+200B) and space character to pass bits before and after space. Main advantage of our algorithm file format will not be change and this will decrease the ability of Stegoanalysis to observe hidden data. Moreover ZWC algorithm can be applied to any language (ASCII, Unicode)

    Robust Text Steganography Algorithms for Secure Data Communications

    Get PDF
    In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms

    Performance Evaluation of AODV and DSR Routing Protocols in MANET Networks

    Get PDF
    Extensive use of wireless networks in different fields increases the need to improve their performance, as well as minimize the amplitude of loss messages. Device mobility, where there is no standard topology that can be applied or fixed routing that can be designed, is a topic that received recent attention in wireless networks. In a Mobile Ad Hoc Network (MANET), some nodes may join the network while others may leave. In this paper, we analyze a MANET’s performance for two proactive protocols; Ad Hoc On-Demand Distance Vector (AODV) Protocol, and Dynamic Source Routing (DSR) Protocol. By using network simulator NS2, we setup and evaluate the performance of AODV and DSR protocols with respect to the packets’size

    Adaptive Equalization: LMS, RLS and CMA

    Get PDF
    This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using different Quadrature Amplitude Modulation (QAM) techniques (4-QAM, 8-QAM); using Frequency Flat Fading and Frequency Selective Fading

    Medical image encryption techniques: a technical survey and potential challenges

    Get PDF
    Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems

    Text Steganography Using Language Remarks

    Get PDF
    © ASEE 2013With the rapid growth of networking mechanisms, where large amount of data can be transferred between users over different media, the necessity of secure systems to maintain data privacy increases significantly. Different techniques have been introduced to encrypt data during the transfer process to avoid any kind of attack. One of these techniques is to hide the data inside another file which is called Steganography. In steganography, data is hidden inside a carrier file where anyone can see, but the hidden data inside it cannot be discovered. To this end, good algorithms can avoid the suspicion of having any attacker by applying some criteria before sending the data. In this paper, we present an algorithm to hide data using a text file as a carrier. Left-Right Remarks that represent Unicode symbols are used to hide the data inside the text file. Moreover, our algorithm can be applied in different size textual data
    corecore