• Sonuç bulunamadı

View of Structure of two way image transmission wireless sensor network using Corvus Corone method

N/A
N/A
Protected

Academic year: 2021

Share "View of Structure of two way image transmission wireless sensor network using Corvus Corone method"

Copied!
9
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

1095

Structure of two way image transmission wireless sensor network using Corvus Corone

method

Buraq Fadhil Neamah1, Heba Hussain Hadi2, Mohammed Shakir Mohmood3

1Administrative & Financial Directorate, Ministry of Higher Education & Scientific Research, Baghdad, Iraq

Boraqfadel80@gmail.com

2Administrative & Financial Directorate, Ministry of Higher Education & Scientific Research, Baghdad, Iraq

Heba_alhayani@yahoo.com

2Scholarship & Cultural Relations Directorate, Ministry of Higher Education & Scientific Research, Baghdad,

Iraq Mahmood@tut.by

Article History: Received: 11 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published

online: 23 May 2021

Abstract.

A two path transmission regards picture into remote channels required picture should viable using channel quali-ties, for example, band width, energy-productive, time utilization & security on grounds that the picture embraces huge space under the gadget of capacity & need quite a while that effectively goes through figure assaults. Besides, quizzical issue regards extra duration into pressure output which, auxiliary cycle regards pressure finished secur-ing devours additional time. Plan/philosophy/concept furthermore, regards settlsecur-ing that problem, compressive de-tecting was arisen, that compacted picture at hour regards dede-tecting arises like quick way which lessens duration utilization & keeps transfer speed use however bombs under got transmission. A few sorts of examination cleared way to determine the security issues under CS by providing security like the auxiliary communication. Discoveries For considering these problem, this research developed module of Corvus Corone two way picture transmission which gives energy effectiveness along model of CS, gotten transmission via framework regards safety into CS like by default technique, these is called as compacted got network & perfect recreation with these regards prom-inent irregular grid checking under CS. Creativity/esteem Experimental yields shows astute module provides en-ergy proficient, got transmission over smaller calculation planning additionally diminished piece blunder rate.

Keywords: Networking, Wireless sensor network, Corvus Corone, MIMO, image transmission.

1 Introduction

Image transmission through a distant channel requires an image to be obtainable with channel credit, so much so that when images with more data must be sent over a tremendous distance, for effective use of the speed of movement A re-requisite [1], less force usage, less time consuming, non-room limits, thus the need to pack data emerges; Restricting terrible information [2]. The level of pressure factor, abortion rate is a part of the factor that should be considered, when pictures are downloaded from the web [3]. The suppressing factor motivates the idea of image degradation, so pre-processing strategies such as correction, segmentation, and illustration must be carried out to overcome these quality-based issues [4]. Once pre-processed, the image is coordinated through various methods, thereby achieving a mechanized construction. These electronic signals consume huge space and extra time when going through a distant channel [5]. The accompanying picture shows the image transmission measurement through the channel.

When receiving a picture, the recognized mark must be reformatted to send the original image, notwith-standing, this signal will be included in the pleated data in the same way. Thus, a valid squeezing factor is an essential to the framework that will relieve this monotonous information. Compressive sensing [CS] is a detection technique that packs the received signal at the time of detection and extracts scary information. Signals can be formulated as depletion or compressed from different regions. Similarly, remaking calculations of CS can recreate the main signal from a low compressive evaluation [6]. The figure shows compressive detection in the channel.

The core of CS for legitimate entertainment is that evaluations must be taken at random for the true choice of the organization. The overall evaluation structures used in CS are alternative associations drawn from the Gaussian or Bernoulli and incomplete Fourier frameworks. These emotional grids differ from some of the other explanations, as well as presenting the restricted isometric property (RIP) con-dition of the phenomenal recovery. If there is a space with an orthonormal basis of Gaussian decipher-ing, then the lattice Gaussian will pass and, therefore, we should recreate the specific strategy with high

(2)

1096 probability. Although CS has been evaluated near unregulated evaluation networks, the problem with self-assured grids is that we cannot store and replicate them on the finder. This construction must be passed near the sign. Experts have therefore revisited their view towards the action of deterministic and composed evaluation structures that can be used as CS evaluation grids. Examples of such constructions are streaming, toplitz, arbitrary networks facilitated, thus advancing, which has made it possible to use CS for common applications. The upsides to legible emotional designs are occurring faster, requiring fewer braking points, and reproducibility, and decreased transmission overhead, while the disadvantage is its safety stress during transmission [7].

Level of pressure, mutilation size, when pictures are downloaded from the web, is a portion of the angles to note. Pressure prompts crumbling of the picture content, so pre-processing approaches like enhance-ment, division & portrayal should be performed to address these consistency-based issues. When pre-handled, the picture gets designed through different methods, coming about under digital structure [8]. Readied sign ought to be reformatted during picture taking care of to get the initially communicated picture, yet this sign will in like manner give dreary information. It is moreover basic to give a fitting pressing factor strategy to take out such dull data. Such optional frameworks are in agreeable along every interesting beginning & agree to the state of ideal recuperation of the kept isometric property. In the event that Gaussian course has a spot with a symmetrical reason, by then the grid will be Gaussian dissipated & under this way we will have the decision to recuperate the specific strategy along high likelihood. In spite of the way that the CS has been evaluated along subjective assessment networks yet the issue along sporadic matrices is that we can't store & copy them at gatherer [9].

This structure needs a tube sent along the sign. So the researchers have diverted their thought toward the plan of deterministic & coordinated assessment matrices that can be utilized as CS assessment cross sections. Occasions of such cross sections are circle, latrines & coordinated self-assertive organizations, which have made it conceivable to use CS for reasonable applications [10]. The plan of this paper is summarized as follows. Portion 2 arrangements along related investigation work. Portion 3 discussed the proposed theory. Region 4 inspected the result & execution appraisal of this assessment & end in portion 5.

2 Related Works

In [11] author propose another structure for picture compressive detecting recuperation by means of cooperative sparsity, which upholds neighborhood 2D sparsity & non local 3D sparsity all the while under a versatile crossover space-change area, accordingly considerably using inborn sparsity of regular pictures & significantly binding the CS arrangement space. What's more, a proficient expanded Lagran-gian-based procedure is created to take care of the above advancement issue.

In [12] author depicted these notes give a numerical prologue to compressive detecting focusing on recuperation using'1-minimization & organized irregular grids. An accentuation is put on techniques for demonstrating probabilistic evaluations for condition quantities of organized irregular mama in-stants. Assessments of this kind are critical to giving conditions that guarantee precise or approximate recovery of inadequate vectors using'1-minimization.

In [13] author imaginatively & accurately delineates that a subliminal computation called symmetric coordinate with chase (OMP) reliably reproduces a signal with m non-zero squares in measure D, given irregular direct approximations of that signal. : Can install. This is a monstrous correction compared to previous results, which require O (m 2) estimates. The new results for the OMP are practically identical to the late results for another method, called basis search (BP).

In [14] author portray here is a sense where this outcome is ideal; it is for the most part difficult to get a higher precision from any arrangement of K estimations at all. The philosophy stretches out to differ-ent other arbitrary estimation outfits; for instance, we show that comparable outcomes hold in the evdiffer-ent that one notices a couple of arbitrarily examined Fourier coefficients of f. Truth be told, the outcomes are very broad & require just two speculations on the estimation troupe which are nitty gritty.

In [15] author delineated applying the following condition in addition to the decay model of the low (L + S) framework to recreate the sample under flexible MRI like the foundation & best control regards flexible parts under deferent issues regards clinical involvement.

In [16] author portrayed Compressed detecting (CS) has as of late arose as an incredible sign securing worldview. Fundamentally, CS empowers the recuperation of high-dimensional inadequate signs from moderately scarcely any straight perceptions as projections onto an assortment of test vectors. Existing

(3)

1097 outcomes show that if the passages of the test vectors are autonomous acknowledge of certain zero-mean irregular factors, at that point with high likelihood the obscure signs can be recuperated by settling a manageable raised advancement.

In [17] author portrayed another novel 1D–tumultuous guide is suggested that is utilized to build an ambiguity pivoted turbulent estimation network. The turbulent property regards proposed map has been tentatively investigated. Direct estimations got were befuddled & diffused utilizing turbulent succession created utilizing the proposed map. The disorder based estimation framework development brings about diminished information stockpiling & data transfer capacity prerequisites. As it needs to store just the boundaries needed to create the turbulent succession. Additionally, the affectability of the disorder to the boundaries makes the information transmission secure.

In [18] author portrayed super wide band (UWB) channel assessment dependent on the hypothesis of compressive detecting (CS) is created. The proposed approach depends on the way that sending a super short heartbeat via many UWB channel prompts a got UWB signal which may counted via straight blend regards couple of particles via pre-characterized word reference, yielding hence a scanty portrayal of the got UWB signal.

In [19] author depicted a speculation of the CS worldview dependent on hemitropic estimation of the l(0) semi standard & show how MR picture recreation can be pushed much further beneath as far as possible & fundamentally nearer to the hypothetical bound. Keeping a concise survey of standard CS strategies & the created hypothetical expansions, a few model MRI reproductions from exceptionally under sampled K-space information are introduced.

In [20] author portrayed Wireless correspondence between a couple of hubs can experience the ill ef-fects of self obstruction emerging from multi path engendering reflecting off impediments in the cli-mate. In case of a profound blur, brought about by dangerous impedance, no sign force is seen at the collector, thus correspondence comes up short. Multi path blurring can be overwhelmed by moving the area of one hub, or by exchanging the correspondence transporter recurrence.

In [21] described technique known as attractive properties regards Topsy-Turvy network utilizing Fig-uring of Gram Schmidt. At the time of given in self assured transformation, fixed guides were used through the dispersal framework. The method uses symmetric keys in encryption & unscrambling exe-cution, for example, the near key (secret key) used in encryption & uncompressed side. Pictures mixed with a mysterious key can be terrible using same mystery point. Possibility regards spatio temporal separation may increase allies to improve the security adequacy of the framework.

In [22] the author introduced two amazing frameworks for image transmission over dual channels with the speed of additional material bursts visible through the limited memory Pola (transformation) chan-nel.

In [23] the author helped to move square fuzzy channels & spread spatial classification through joint-source-channel coding schemes.

In [24] the author explained another process through joining QR Rot & figured out how to deal with the dissemination issue of complex organizations with the help of data manipulation. The technique constructed estimation cross sections with guides to Gaussian disturbances so that the sparse data or-ganization could be altered through stuffed detection. Finally, the mentioned functions without control input, the methodology for compact detection, cannot win with respect to replicating complex organi-zations in which hub states were created directly through the organization system.

In [25] as the author demonstrated by the quick & dirty evaluation, it is understandable that papers in the form of an inbuilt cycle in CS are ill-defined at this point & authentic evaluation of the uproar in the unexpected quantification of the multiplication phase. .

3 Research Methodology

3.1. System Design

2 way picture correspondence system generates the issue of high energy consumption due to the use of heavy exchange speed through countless fragments & undergoes various associations such as receiving, pressure, transformation requiring additional computational time, The way to pick up speed decreases regardless of time. Thus, to crush as a joint focal point for acquisition, pressure, & change, the possibility of compressed detection is exploited through a tendency of dimensional degradation & sporadic projection, which identifies itself & the exchange speed. Reduces the use of. This module uses the least squares model to select unpredictable variables in spatial space as a regular structure, as well

(4)

1098 as less information transmission through quantization & a view of the evaluators' leadership in de-quantization. Impressive exposes the whole. Figure 1 shows the proposed two-way auxiliary diagram transmission model. In addition, the scattering & scattering of a Tughlaq property under booby ringer has been utilized like systematic situation under quantization, which, along with the language of the sprites, claims to see those natural things, which are picture bits. .

In Fig. 1, Customer 1 & Customer 2 partners with two-path correspondence via the proposed Corvus Coron module transmission system. Upper transmitter side, customer gives picture via creation of the subjective variable from the main image as a stuffed design, & then the elements in the picture are mixed using the predatory property of the fiddling ringer. The mathematical calculation regards module has been explained below by region.

Figure 1. Two way image tranmission module of corvus corone

3.2. Image At Transmitter

The way the communication is done, the image is compressed as a single system, so the amount of fragments is reduced, which produces less energy usage information transmission as well as energy-efficient transmission. . Also through differences in pixels with respect to extreme characteristics, all pixels are mixed, accordingly it protects picture data from attackers. The pseudocode for progress to press protection is given in Figure 2. Figure 2 states that the image that must be expressed at the required stage is selected by presenting all the features as pixel depictions. Till then the subjective evaluation selected as a unit line or area matrix is used. Finally, for safety, turbulent characteristics are created, & through the multiplier factor, the final stuffed milled matrix is molded. Gradually compacted yield should provided in MIMO are with objective which customer 2 may obtain picture regards customer 1.

3.3. MIMO with Image Transmission

To improve structure boundaries & conditions, module utilizing MIMO technology. With enhancment regards wire of radio, MIMO & interference shift techniques, has been necesory to consider coordinated transmission over comparative band at same time. What's more, the problem of clandestine terminal, interference problem achieved via MAC plots, & the heavily deferred issue in multi-hop remote organizations can be fixed in MIMO. Limitations considered for immediate transmissions as shown under Table 1 The interaction regards transmission of image through MIMO is clarified under Fig. 5.

Table 1. Parameters

Terms Method Considered

scheme of Transmission receiving MIMO

Access of Channel Full duplexing

(5)

1099

Scheme of Coding Modulation Coding

Channel of Fading Rayleigh fading Channel

Consideration of Noise Additive White Gaussian Noise

For picture correspondence, structure involved 2 nodes, & each node have been 2 gathering contraptions which may send & recieve data. Like to node MIMO conveying the message balancing module changes over the high level sign into two branches. This structure permits the hub to convey & get all bundles & may enhance solid quality & data pace regards system via extra coding & space variety measures.

3.4. Image Reconstruction Phase

By & by the initially changed sign gets decoded. By then to recuperate the principal picture the going with exact procedures were utilized through separating each grid to gain the primary picture. The decision of security framework may unscramble via opposite limit regards wild advantages of regards playing ring. Through knowing the basic turbulent characteristics, the translation relation grid is performed through the features that have been performed from the beginning, in which IM has been first picture created via Corvus Coron module. Pseudocode regards reproduction period regards implemented module was visible under Fig. 2.

Decrypted Image

Figure 2. image reconstruction

Figure 2 explains which unscramble picture, multiplication regards smaller got grid is finished, at that opposite assessment regards wild advantages regards playing ringer was resolved from the start, & thereafter using the assumption for the backslide rule the unpredictable structure are revamped absolutely. This rule helps along getting the principal picture as a yield.

Through the overall arrangement of the proposed, vast amounts of picture bits are compressed through the stuffed gated network, which helps in transferring less information, meanwhile creating energy-producing transmissions, & found in the structure Resources confuse it. As an attacker module to hack the picture, the additional estimation time taken for discretionary cycles is waived, thereby speeding up transmission. The picture channel becomes more suitable with information move limits & sends safely through the stuffed security network with shorter estimation times at the time of module was used regards single course transmission of image under MIMO.

4 Experimental Results

Implemented two way transmission regards module of Corvus Coron was performed utilizing notable picture handling tool Matlab. On Windows 10 we have implemented the proposed model using MATLB 2015. The processor with Intel i5 has 8GB RAM. A subtle bizarre description of the outcome of the implementation & its presentation through this particular medium is explored in the next section.

(6)

1100 Figure 3: Channel capacity

Figure 4: Normalized SNR

Figure 5: PSNR

Table 2: Performance Evaluation On channel state Data S.

No

Images No CSI With CSI

Capacity of Ergodic capacity of Outage capacity of Ergodic capacity of Outage 1. Couple 41.8453 30.2128 24.8175 22.2490

(7)

1101 Figure 6: Outage & Ergoic performance utilizing no CSI

Figure 7: Outage & Ergoic performance utilizing CSI

Regards to developed models communication under conditions regards capabilty (Ergodic & Outage) utilizing no channel side data & utilizing data of channel side.

The above figure 7 described error of mean squared, error of root mean squared & error of mean abso-lute regards implemented technique.

2. Barbara 43.7456 31.1123 25.7215 23.7462 3. Cameraman 46.2561 32.6412 22.5578 20.7314 4. Lena 46.5521 32.3221 23.4156 20.8554

5. Man 43.8835 31.7415 25.1127 21.7127

(8)

1102

Figure 8: Input images Symbol error rate

Figure 9: Saved energy Performance analysis

Comparative study regards consumption of energy & saved energy utilizing current method simultane-ously.

5 Conclusion & Future Work

The paper recommends utilizing an all-inclusive adaptation waveletimage pressure called need picture transmission (PIT) to accomplish higher energy productivity in WSN picture transmission & broaden network lifetime. In this examination a remote interactive media network is viewed as which sensor hubs are furnished with sight & sound gadgets, for example, cameras.We have appeared through reproduction that PIT improves theenergy effectiveness of camera prepared hub of sensor organizations. The proposed method is straightforward & simple to be carried out. Execution assessment has shown that PIT should build the lifetime with a worthy compromiseon the picture quality. In our future examination considers we will research the multi-way directing methodology which may additionally upgrade the exhibition of the proposed PIT.

References

1. Chandra, M., Agarwal, D., & Bansal, A. (2016). Image transmission through wireless channel: A review. 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control & Energy Systems (ICPEICES). doi:10.1109/icpeices.2016.7853121.

2. Mahajan, H.B., & Badarla, A. (2018). Application of Internet of Things for Smart Precision Farming: Solutions & Challenges. International Journal of Advanced Science & Technology, Vol. Dec. 2018, PP. 37-45.

3. Talukder, Kamrul & Harada, Koichi. (2010). Haar Wavelet Based Approach for Image Compression & Quality Assessment of Compressed Image. IAENG Int J Appl Math. 36. 4. Hepper, Dietmar. (2014). Film grain noise superimposition for film grain management.

252-255. 10.1109/ICCE.2014.6775992..

5. Yang, J., He, S., Lin, Y., & Lv, Z. (2015). Multimedia cloud transmission & storage system based on internet of things. Multimedia Tools & Applications, 76(17), 17735–17750. doi:10.1007/s11042-015-2967-9.

6. Mahajan, H.B., & Badarla, A. (2018). Application of Internet of Things for Smart Precision Farming: Solutions & Challenges. International Journal of Advanced Science & Technology, Vol. Dec. 2018, PP. 37-45.

7. Qaisar, Saad & Bilal, Rana Muhammad & Iqbal, Wafa & Naureen, Muqaddas & Lee, Sungyoung. (2013). Compressive Sensing: From Theory to Applications, a Survey. Communications & Networks, Journal of. 15. 443-456. 10.1109/JCN.2013.000083.

8. Zhang, Y., Zhang, L. Y., Zhou, J., Liu, L., Chen, F., & He, X. (2016). A Review of Compressive Sensing in Information Security Field. IEEE Access, 4, 2507–2519. doi:10.1109/access.2016.2569421.

(9)

1103 9. Marvasti, F., Amini, A., Haddadi, F., Soltanolkotabi, M., Khalaj, B. H., Aldroubi, A., … Chambers, J. (2012). A unified approach to sparse signal processing. EURASIP Journal on Advances in Signal Processing, 2012(1). doi:10.1186/1687-6180-2012-44.

10. Karakus, C., Gurbuz, A. C., & Tavli, B. (2013). Analysis of Energy Efficiency of Compressive Sensing in Wireless Sensor Networks. IEEE Sensors Journal, 13(5), 1999–2008. doi:10.1109/jsen.2013.2244036.

11. Zhang, J., Zhao, D., Zhao, C., Xiong, R., Ma, S., & Gao, W. (2012). Image Compressive Sensing Recovery via Collaborative Sparsity. IEEE Journal on Emerging & Selected Topics in Circuits & Systems, 2(3), 380–391. doi:10.1109/jetcas.2012.2220391.

12. Fornasier, M. (Ed.). (2010). Compressive Sensing & Structured Random Matrices. Radon Series on Computational & Applied Mathematics. doi:10.1515/9783110226157.1.

13. Tropp, J. A., & Gilbert, A. C. (2007). Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit. IEEE Transactions on Information Theory, 53(12), 4655–4666. doi:10.1109/tit.2007.909108.

14. Candes, E. J., & Tao, T. (2006). Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? IEEE Transactions on Information Theory, 52(12), 5406–5425. doi:10.1109/tit.2006.885507.

15. Otazo, R., Candès, E., & Sodickson, D. K. (2014). Low-rank plus sparse matrix decomposition for accelerated dynamic MRI along separation of background & dynamic components. Magnetic Resonance in Medicine, 73(3), 1125–1136. doi:10.1002/mrm.25240.

16. Haupt, J., Bajwa, W. U., Raz, G., & Nowak, R. (2010). Toeplitz Compressed Sensing Matrices Along Applications to Sparse Channel Estimation. IEEE Transactions on Information Theory, 56(11), 5862–5875. doi:10.1109/tit.2010.2070191.

17. Ponuma, R., & Amutha, R. (2017). Compressive sensing based image compression-encryption using Novel 1D-Chaotic map. Multimedia Tools & Applications, 77(15), 19209–19234. doi:10.1007/s11042-017-5378-2.

18. Paredes, J. L., Arce, G. R., & Wang, Z. (2007). Ultra-Wideband Compressed Sensing: Channel Estimation. IEEE Journal of Selected Topics in Signal Processing, 1(3), 383–395. doi:10.1109/jstsp.2007.906657.

19. Trzasko, Joshua & Manduca, Armando. (2009). Highly Undersampled Magnetic Resonance Image Reconstruction via Homotopic $\ell_{0}$ -Minimization. IEEE transactions on medical imaging. 28. 106-21. 10.1109/TMI.2008.927346.

20. Watteyne, Thomas & Lanzisera, Steven & Mehta, A. & Pister, Kristofer. (2010). Mitigating Multipath Fading through Channel Hopping in Wireless Sensor Networks. 1 - 5. 10.1109/ICC.2010.5502548.

21. Ahmad, J., Khan, M. A., Hwang, S. O., & Khan, J. S. (2016). A compression sensing & noise-tolerant image encryption scheme based on chaotic maps & orthogonal matrices. Neural Computing & Applications, 28(S1), 953–967. doi:10.1007/s00521-016-2405-6.

22. Capacity of Burst Noise-Erasure Channels Along & Without Feedback & Input Cost. (2018). IEEE Transactions on Information Theory, 1–1. doi:10.1109/tit.2018.2862354.

23. Tarique, Mohammed. (2016). Performances of Orthogonal Wavelet Division Multiplex (OWDM) System Under AWGN, Rayleigh & Ricean Channel Conditions. International Journal of Computer Networks & Communications. 8. 10.5121/ijcnc.2016.8307.

24. Li, L., Xu, D., Peng, H., Kurths, J., & Yang, Y. (2017). Reconstruction of Complex Network based on the Noise via QR Decomposition & Compressed Sensing. Scientific Reports, 7(1). doi:10.1038/s41598-017-15181-3.

25. Singh, A. K. (2016). Improved hybrid algorithm for robust & imperceptible multiple watermarking using digital images. Multimedia Tools & Applications, 76(6), 8881–8900. doi:10.1007/s11042-016-3514-z.

Referanslar

Benzer Belgeler

Having completed the the visits and the required rites, Dervish Shaban was submitted the trusts to be given to Elmali baba together with the following edict as an authorisation

Çünkü olay, Bedreddin oyunu ile ba­ şlayan ve gelecek yıllarda giderek başka oyunlarla büyüyecek bir olay.. Gene, geçtiğimiz günlerde bir ba­ şka sanat çılgınlığı

28 Selâtîn-i ‘Azâm vakıfları ve diğer vakıflardan fukara için tahsis edilen ve her yıl muharrem ayında imârethâne-i âmirede pişirilip dağıtılmakta olan

Buna mukabil, Bijeljina defterinde bulunan 34 adet evlenme kayd›n›n sadece 5 adedi farkl› köylerde yaflayanlar aras›nda, 1 adedi ayn› köyden 28 adedi ise ayn›

Tam bir müzik adamı olan Yannis Saoulis, Türkiyeli müziklerle de yalandan ilgileniyor, bu konuda arşiv çalışmaları yapan Haşan Saltık'ı çok takdir ettiğini

Çağdaş Türk Resm i’mn genç kuşak sanatçılarından Çayhan'm resimlerindeki gerçeklik göreceli olarak gelişiyor v e sunulan imaj­ lardaki dramatik soyutluğun, ö z ­

Araştırmada verilerin yapılan Pearson Korelasyon Analizi sonucunda cinsiyet, yaş, medeni durum, günlük çalışma süresi, haftada bakılan dosya sayısı ile

1959 da çevirdiği DENİ­ ZE İNEN SOKAK, 1960 Car- lovy -Vary ve Lugano Ulus­.. lararası Film