Preferred Language
Articles
/
4xdoUpEBVTCNdQwCi5TM
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed for protecting information integrity when data is being transferred over a harsh communication medium. Hence, a separate channel coding protocol is often

Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Secure Wireless Communications in Broadcast Channels With Confidential Messages
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Baghdad Science Journal
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 15 2025
Journal Name
Iraqi Journal Of Laser
Performance Enhancement of Metasurface Grating Polarizer Using Deep Learning for Quantum Key Distribution Systems
...Show More Authors

Metasurface polarizers are essential optical components in modern integrated optics and play a vital role in many optical applications including Quantum Key Distribution systems in quantum cryptography. However, inverse design of metasurface polarizers with high efficiency depends on the proper prediction of structural dimensions based on required optical response. Deep learning neural networks can efficiently help in the inverse design process, minimizing both time and simulation resources requirements, while better results can be achieved compared to traditional optimization methods. Hereby, utilizing the COMSOL Multiphysics Surrogate model and deep neural networks to design a metasurface grating structure with high extinction rat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Calculations of Signal to Noise Ratio (SNR) for Free Space Optical Communication Systems
...Show More Authors

In this paper, we calculate and measure the SNR theoretically and experimental for digital full duplex optical communication systems for different ranges in free space, the system consists of transmitter and receiver in each side. The semiconductor laser (pointer) was used as a carrier wave in free space with the specification is 5mW power and 650nm wavelength. The type of optical detector was used a PIN with area 1mm2 and responsively 0.4A/W for this wavelength. The results show a high quality optical communication system for different range from (300-1300)m with different bit rat (60-140)kbit/sec is achieved with best values of the signal to noise ratio (SNR).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Wireless Networks
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication

... Show More
View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Fri May 03 2024
Journal Name
Journal Of Optics
Transmission Of 10 Gb/s For Underwater Optical Wireless Communication System
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Survival estimation for singly type one censored sample based on generalized Rayleigh distribution
...Show More Authors

This paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.

View Publication Preview PDF
Crossref