Preferred Language
Articles
/
6RdqUpEBVTCNdQwCZ5Te
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Recognition of Upper Limb Movements Based on Hybrid EEG and EMG Signals for Human-Robot Interaction
...Show More Authors

Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin

... Show More
View Publication
Crossref
Publication Date
Mon May 27 2024
Journal Name
Eureka: Physics And Engineering
Systematic development of an autonomous robotic car for fire-fighting based on the interactive design approach
...Show More Authors

Fire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed

... Show More
View Publication
Scopus Crossref
Publication Date
Fri May 03 2024
Journal Name
Optical And Quantum Electronics
Design and analysis of a dual-core PCF biosensor based on SPR for cancerous cells detection
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Applied Engineering Science
Design and implementation of a smart home automation system based on global system for mobile communications
...Show More Authors

Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jun 16 2025
Journal Name
Journal Mustansiriyah Of Sports Science
The influence of excellent offensive basketball skill-learning activities based on sensory perceptions for female pupils.
...Show More Authors

The aim of this research is to develop qualitative workouts based on certain sensory perceptions for the development of offensive basketball abilities and to determine their impact on female pupils. Several findings, based on the au-thor's extensive expertise instructing basketball materials and our closeness to the sample, revealed deficits in some sensory perceptions “in the game of basketball”, which impair the accuracy of passing the ball to the best team-mate. It also affects the pace of dribbling and the difficulty of selecting the op-timal moment and distance to fire. Therefore, the researcher designs qualita-tive activities based on many sensory experiences, including distance, speed, force, and direction shift. In addition, the

... Show More
View Publication
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Comparison of Maximum Likelihood and some Bayes Estimators for Maxwell Distribution based on Non-informative Priors
...Show More Authors

In this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of B

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Comparison of Maximum Likelihood and some Bayes Estimators for Maxwell Distribution based on Non-informative Priors
...Show More Authors

In this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes est

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More