Recently, there is increasing interest in using joint transform correlation (JTC) technique for optical pattern recognition. In this technique, the target and reference images are jointed together in the input plane and no matched filter is required. In this paper, the JTC is investigated using simulation technique. A new discrimination decision algorithm is proposed to recognize the correlation output for different object shapes (dissimilar shapes). Also, new architectures are proposed to overcome the main problems of the conventional JTC.
Breast cancer is one of the most critical diseases suffered by many people around the world, making it the most common medical risk they will face. This disease is considered the leading cause of death around the world, and early detection is difficult. In the field of healthcare, where early diagnosis based on machine learning (ML) helps save patients’ lives from the risks of diseases, better-performing diagnostic procedures are crucial. ML models have been used to improve the effectiveness of early diagnosis. In this paper, we proposed a new feature selection method that combines two filter methods, Pearson correlation and mutual information (PC-MI), to analyse the correlation amongst features and then select important features before passing them to a classification model. Our method is capable of early breast cancer prediction and depends on a soft voting classifier that combines a certain set of ML models (decision tree, logistic regression and support vector machine) to produce one model that carries the strengths of the models that have been combined, yielding the best prediction accuracy. Our work is evaluated by using the Wisconsin Diagnostic Breast Cancer datasets. The proposed methodology outperforms previous work, achieving 99.3% accuracy, an F1 score of 0.9922, a recall of 0.9846, a precision of 1 and an AUC of 0.9923. Furthermore, the accuracy of 10-fold cross-validation is 98.2%.
Vast number of researches deliberated the separation of speech mixtures due to the importance of this field of research . Whereas its applications became widely used in our daily life; such as mobile conversation, video conferences, and other distant communications. These sorts of applications may suffer from what is well known the cocktail party problem. Independent component analysis (ICA) has been extensively used to overcome this problem and many ICA algorithms based on different techniques have been developed in this context. Still coming up with some suitable algorithms to separate speech mixed signals into their original ones is of great importance. Hence, this paper utilizes thirty ICA algorithms for estimating the original speech signals from mixed ones, the estimation process is carried out with the purpose of testing the robustness of the algorithms once against a different number of mixed signals and another against different lengths of mixed signals. Three criteria namely Spearman correlation coefficient, signal to interference ratio, and computational demand have been used for comparing the obtained results. The results of the comparison were sufficient to signify some algorithms which are appropriate for the separation of speech mixtures.
Experts and researchers in the field of information security have placed a high value on the security of image data in the last few years. They have presented several image encryption techniques that are more secure. To increase the security level of image encryption algorithms, this article offers an efficient diffusion approach for image encryption methods based on one- dimensional Logistic, three-dimensional Lorenz, DNA encoding and computing, and SHA-256. The encryption test demonstrates that the method has great security and reliability. This article, also, examines the security of encryption methods, such as secret key space analysis, key sensitivity test, histogram analysis, information entropy process, correlation examination, and differential attack. When the image encryption method described in this article is compared to several previous image encryption techniques, the encryption algorithm has higher information entropy and a lower correlation coefficient.
Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.
Cybersecurity awareness has a huge impact on individuals and an even bigger impact on firms, universities, and institutes to those individuals belong. Consequently, it is essential to explore and asses the factors affecting the awareness level of cybersecurity. More specifically this research study examines the impact of demographic features of individuals on cybersecurity awareness. The Studied literature’s limitations have been addressed and overcome in our research from the variability, and ambiguity aspects. A questionnaire was developed and responses were collected from 613 participants. Reliability and validity tests as well as correlations have been applied for the instruments and data employed in this study. Coefficients were calculated via multiple linear regression for the weights of each of the cybersecurity components. Data reliability test showed that Cronbach’s Alpha value of 0.707 for the used data which is acceptable for research purposes. Results analysis showed r-value for each of the questions is greater than the r table which was 0.07992. Examining the proposed hypotheses showed that there is a difference as the null hypothesis is rejected for one of the demographic features being tested namely, gender. While there is no significant difference when it comes to the other two factors, education level, and age. Using the weight for each of the components, password security, technical behavior, and social influence could provide a solid base for decision-makers to focus on and implement the available resources for gender-specific developments to raise the cybersecurity awareness level..
This paper presented an investigation into the performance of system identification using an Adaptive Neuro-Fuzzy Inference System (ANFIS) technique for the dynamic modelling of a two- dimensional flexible plate structure. It is confirmed experimentally, using National Instrumentation (NI) Data Acquisition System (DAQ) and flexible plate test rig that ANFIS can be effectively used for modelling the system with highly accurate results. The accuracy of the modelling results is demonstrated through validation tests including training and test validation and correlation tests.
In nowadays world of rapid evolution of exchanging digital data, data protection is required to protect data from the unauthorized parities. With the widely use of digital images of diverse fields, it is important to conserve the confidentiality of image’s data form any without authorization access. In this paper the problem of secret key exchanging with the communicated parities had been solved by using a random number generator which based on Linear Feedback Shift Register (LFSR). The encryption/decryption is based on Advance Encryption Standard (AES) with the random key generator. Also, in this paper, both grayscale and colored RGB images have been encrypted/decrypted. The functionality of proposed system of this paper, is concerned with three features: First feature, is dealing with the obstetrics of truly random and secure encryption key while the second one deals with encrypting the plain or secret image using AES algorithm and the third concern is the extraction the original image by decrypting the encrypted or cipher one. “Mean Square Error (MSE)”, “Peak Signal to Noise Ratio (PSNR)”, “Normalized Correlation (NK)”, and “Normalized Absolute Error (NAE)” are measured for both (original-encrypted) images and (original-decrypted) image in order to study and analyze the performance of the proposed system according to image quality features.
This paper proposes a new design of compact coplanar waveguide (CPW) fed -super ultra-wideband (S-UWB) MIMO antenna with a bandwidth of 3.6 to 40 GHz. The proposed antenna is composed of two orthogonal sector-shape monopoles (SSM) antenna elements to perform polarization diversity. In addition, a matched L-shaped common ground element is attached for more efficient coupling. The FR-4 substrate of the structure with a size of 23 × 45 × 1.6 mm3 and a dielectric constant of 4.3 is considered. The proposed design is simulated by using CST Microwave Studio commercial software. The simulation shows that the antenna has low mutual coupling (|S21| < -20 dB) with |S11|<−10 dB, ranging from 3.6 to 40 GHz. Envelope correlation coefficient (ECC) is less than 0.008, diversity gain (DG) is more than 9.99, mean effective gain (MEG) is below - 3 dB and total active reflection coefficient (TARC) is less than -6 dB over the whole response band is reported. The proposed MIMO antenna is expected efficiently cover the broadest range of frequencies for contemporary communications applications.
In this paper, a two-dimensional (2-D) circular-support wavelet transform (2-D CSWT) is presented. 2-D CSWT is a new geometrical image transform, which can efficiently represent images using 2-D circular spectral split schemes (circularly- decomposed frequency subspaces). 2-D all-pass functions and lattice structure are used to produce 1-level circular symmetric 2-D discrete wavelet transform with approximate linear phase 2-D filters. The classical one-dimensional (1-D) analysis Haar filter bank branches H 0 (z) and H 1 (z) which work as low-pass and high-pass filters, respectively are transformed into their 2-D counterparts H 0 (z 1 ,z 2 ) and H 1 (z 1 ,z 2 ) by applying a circular-support version of the digital spectral transformation (DST). The designed 2-D wavelet filter bank is realized in a separable architecture. The proposed architecture is simulated using Matlab program to measure the deflection ratio (DR) of the high frequency coefficient to evaluate its performance and compare it with the performance of the classical 2-D wavelet architecture. The correlation factor between the input and reconstructed images is also calculated for both architectures. The FPGA (Spartan-3E) Kit is used to implement the resulting architecture in a multiplier-less manner and to calculate the die area and the critical path or maximum frequency of operation. The achieved multiplier-less implementation takes a very small area from FPGA Kit (the die area in 3-level wavelet decomposition takes 300 slices with 7% occupation ratio only at a maximum frequency of 198.447 MHz).
This article analyzes thoroughly the performance of the Multi-Pulse Diode Rectifiers (MPDRs) regarding the quality of input/output voltage and currents. Two possible arrangements of MPDRs are investigated: series and parallel. The impact of the DC side connection on the performance of the MPDRs regarding the operation parameters and rectifier indices are comprehensively examined. Detailed analytical formulas are advised to identify clearly the key variables that control the operation of MPDRs. Moreover, comprehensive simulation results are presented to quantify the performance and validate the analytical analysis. Test-rig is set up to recognize the promising arrangement of MPDRs. Significant correlation is there between simulation and practical results. The analytical results are presented for aircraft systems (400Hz), and power grid systems (60Hz). This is to study the impact of voltage and frequency levels on the topology type of MPDRs. In general, each topology shows merits and have limitations.
For many uses, biometric systems have gained considerable attention. Iris identification was One of the most powerful sophisticated biometrical techniques for effective and confident authentication. The current iris identification system offers accurate and reliable results based on near-infrared light (NIR) images when images are taken in a restricted area with fixed- distance user cooperation. However, for the color eye images obtained under visible wavelength (VW) without collaboration among the users, the efficiency of iris recognition degrades because of noise such as eye blurring images, eye lashing, occlusion, and reflection. This work aims to use the Gray-Level Co-occurrence Matrix (GLCM) to retrieve the iris's characteristics in both NIR iris images and visible spectrum. GLCM is second-order Statistical-Based Methods for Texture Analysis. The GLCM- based extraction technology was applied after the preprocessing method to extract the pure iris region's characteristics. The Energy, Entropy, Correlation, Homogeneity, and Contrast collection of second-order statistical features are determined from the generated co-occurrence matrix, Stored as a vector for numerical features. This approach is used and evaluated on the CASIA v1and ITTD v1 databases as NIR iris image and UBIRIS v1 as a color image. The results showed a high accuracy rate (99.2 %) on CASIA v1, (99.4) on ITTD v1, and (87%) on UBIRIS v1 evaluated by comparing to the other methods.
Audio encryption has gained popularity in a variety of fields including education, banking over the phone, military, and private audio conferences. Data encryption algorithms are necessary for processing and sending sensitive information in the context of secure speech conversations. In recent years, the importance of security in any communications system has increased. To transfer data securely, a variety of methods have been used. Chaotic system-based encryption is one of the most significant encryption methods used in the field of security. Chaos-based communication is a promising application of chaos theory and nonlinear dynamics. In this research, a chaotic algorithm for the new chaotic chameleon system was proposed, studied, and implemented. The chameleon chaotic system has been preferred to be employed because it has the property of changing from self-excited (SA) to hidden-attractor (HA) which increases the complexity of the system dynamics and gives strength to the encryption algorithm. A chaotic chameleon system is one in which, depending on the parameter values, the chaotic attractor alternates between being a hidden attractor and a self-excited attractor. This is an important feature, so it is preferable to use it in cryptography compared to other types of chaotic systems. This model was first implemented using a Field Programmable Gate Array (FPGA), which is the first time it has been implemented in practical applications. The chameleon system model was implemented using MATLAB Simulink and the Xilinx System Generator model. Self-excited, hidden, and coexisting attractors are shown in the proposed system. Vivado software was used to validate the designs, and Xilinx ZedBoard Zynq-7000 FPGA was used to implement them. The dynamic behavior of the proposed chaotic system was also studied and analysis methods, including phase portrait, bifurcation diagrams, and Lyapunov exponents. Assessing the quality of the suggested method by doing analyses of many quality measures, including correlation, differential signal-to-noise ratio (SNR), entropy, histogram analysis, and spectral density plot. The numerical analyses and simulation results demonstrate how well the suggested method performs in terms of security against different types of cryptographic assaults.
The reluctance of industry to allow wireless paths to be incorporated in process control loops has limited the potential applications and benefits of wireless systems. The challenge is to maintain the performance of a control loop, which is degraded by slow data rates and delays in a wireless path. To overcome these challenges, this paper presents an application–level design for a wireless sensor/actuator network (WSAN) based on the “automated architecture”. The resulting WSAN system is used in the developing of a wireless distributed control system (WDCS). The implementation of our wireless system involves the building of a wireless sensor network (WSN) for data acquisition and controller area network (CAN) protocol fieldbus system for plant actuation. The sensor/actuator system is controlled by an intelligent digital control algorithm that involves a controller developed with velocity PID- like Fuzzy Neural Petri Net (FNPN) system. This control system satisfies two important real-time requirements: bumpless transfer and anti-windup, which are needed when manual/auto operating aspect is adopted in the system. The intelligent controller is learned by a learning algorithm based on back-propagation. The concept of petri net is used in the development of FNN to get a correlation between the error at the input of the controller and the number of rules of the fuzzy-neural controller leading to a reduction in the number of active rules. The resultant controller is called robust fuzzy neural petri net (RFNPN) controller which is created as a software model developed with MATLAB. The developed concepts were evaluated through simulations as well validated by real-time experiments that used a plant system with a water bath to satisfy a temperature control. The effect of disturbance is also studied to prove the system's robustness.