Preferred Language
Articles
/
5hdpUpEBVTCNdQwCl5Tj
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (AWGN) and channels disturbed by Rayleigh fading. Both the inherently wideband DCSK modulation and the space-time block code (STBC) are techniques that …

Scopus Crossref
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Purification Techniques for Cheap Multi –Walled Carbon Nanotubes
...Show More Authors
Abstract<p>Multi-walled carbon nanotubes from cheap tubs company MWCNT-CP were purified by alcohol \ H2O2 \ separation funnel which is simple, easy and scalable techniques. The steps of purification were characterized by X-ray diffraction, Raman spectroscopy, scanning electron microscopy SEM with energy dispersive of X-ray spectroscopy EDX and surface area measurements. The technique was succeeded to remove most the trace element from MWCNT-CP which causing increase the surface area. The ratios of impurities were reduced to less 0.6% after treatment by three steps with losing less than 5% from MWCNT-CP.</p>
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 25 2018
Journal Name
International Journal Of Current Engineering And Technology
Model-Based Design of Piezoelectric Patches used to Repair Damaged Beams under Static Load
...Show More Authors

Static loads exposing to mechanical components can cause cracks, which are lead to form stress concentration regions causing the failure of structure. Generally, from 80% to 90% of structure failure is due to initiation of the cracks. Therefore, it is necessary to repair the crack and reduce its effect on the structure where the effect of the crack is modelled as an additional flexibility to the structure. In the last few years, piezoelectric materials have been considered as one of the most favourable repairing techniques. The piezoelectric material converts the applied voltage on it to a bending moment to counter the bending moment caused by the external load on the beam at the crack location. In this study, the design of the piez

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sat Mar 01 2025
Journal Name
Al-iraqia Journal For Scientific Engineering Research
Blue Laser Optical NOMA Communication Applied on Control Drone-to-Underwater Vehicle
...Show More Authors

oday deep ocean life has not been discovered by humans including many secret world things to be explored. The researcher has focused on underwater optical wireless communications using various kinds of complex digital Signal processing most of them used in air and starting applied in underwater communication. The Internet of Things (IoT) uses underwater called Internet of Underwater Things (IoUT) applications to explore the underwater world with other devices. However, the difference in concentration between air and water surfaces is not easy making wireless communication more complicated. Visible light passes the water's surface with scattering and distortion inside the water and each color of light has different attenuation the blue laser

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 17 2022
Journal Name
Sustainability
Experimental Evaluation of the Thermoelectrical Performance of Photovoltaic-Thermal Systems with a Water-Cooled Heat Sink
...Show More Authors

A design for a photovoltaic-thermal (PVT) assembly with a water-cooled heat sink was planned, constructed, and experimentally evaluated in the climatic conditions of the southern region of Iraq during the summertime. The water-cooled heat sink was applied to thermally manage the PV cells, in order to boost the electrical output of the PVT system. A set of temperature sensors was installed to monitor the water intake, exit, and cell temperatures. The climatic parameters including the wind velocity, atmospheric pressure, and solar irradiation were also monitored on a daily basis. The effects of solar irradiation on the average PV temperature, electrical power, and overall electrical-thermal efficiency were investigated. The findings i

... Show More
View Publication
Scopus (28)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
The effect of wastewater disposal on the water quality and phytoplankton in Erbil wastewater channel.
...Show More Authors

In this study, phytoplankton density, chlorophyll-a, and selected physico- chemical parameters were investigated in Erbil wastewater channel. The surveys were carried out monthly from May 2003 to April 2004. Samplings were established on three sites from headwaters to the mouth. The results showed that pH was in alkaline side of neutrality, with significant differences (P<0.05) between sites 1 and 3. TSS concentration decreased from site 1 toward site 2 (mean value, 80.15 to 25.79 mg.l-1). A clear gradual increase in mineral content (TDS) observed from site one of the channel towards the mouthpart. Soluble reactive phosphate has a concentration maximum mean value reached 48.4 µg.l-1 which is recorded in site 2. A high positive relat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
A Review on Arabic Sign Language Translator Systems
...Show More Authors
Abstract<p>Deaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b</p> ... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref