Preferred Language
Articles
/
6RdqUpEBVTCNdQwCZ5Te
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Mar 01 2017
Journal Name
جامعة كرميان
The effect of a training program for chemistry teachers based on the strategy of both sides of the brain together on the thinking patterns of their students
...Show More Authors

Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Al-kindy College Medical Journal
Radiological Significance of Shear-Wave Elastography Technique for Evaluation of Solid Breast Masses with Histopathological Correlation
...Show More Authors

Background: Although various imaging modalities are available for evaluating suspicious breast lesions, ultrasound-based Shear-Wave Elastography (SWE) is an advanced, non-invasive technique complementary to grayscale sonography. This technique evaluates the elasticity of a specific tissue by applying sonic pressure to that tissue.

Objective: The aim is to assess the role of SWE in evaluating solid breast masses in correlation to histopathological study results.

Subjects and Methods: This prospective study was done in a tertiary care teaching hospital from September 2019 to August 2020. A study population of 50 women aged 18 years or above with an

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Axenic Procyclic Culture of L. tropica and L. donovani in Culture of FBS-free Medium
...Show More Authors

Leishmania causes disease ranging from self-healing cutaneous to fatal visceral leishmaniasis (VL). Leishmaniasis is reported endemic in 88 countries, including Iraq, in which 82% in low-income countries. The diseases develop following the bite of sand flies injecting Leishmania promastigotes into skin. Promastigotes transform into amastigotes in vivo multiplying within macrophages. In this study we have investigated the ability of axenic procyclic promastigotes of cutaneous Leishmania tropica and visceral Leishmania donovani survive in M199 media with or without Fetal Bovine Serum (FBS) added. Three time incubation periods were adopted (24, 48 and 72) hours and the results showed that L. tropica was able to survive and multiply in both

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Location Aspect Based Sentiment Analyzer for Hotel Recommender System
...Show More Authors

Recently personal recommender system has spread fast, because of its role in helping users to make their decision. Location-based recommender systems are one of these systems. These systems are working by sensing the location of the person and suggest the best services to him in his area. Unfortunately, these systems that depend on explicit user rating suffering from cold start and sparsity problems. The proposed system depends on the current user position to recommend a hotel to him, and on reviews analysis. The hybrid sentiment analyzer consists of supervised sentiment analyzer and the second stage is lexicon sentiment analyzer. This system has a contribute over the sentiment analyzer by extracting the aspects that users have been ment

... Show More
View Publication Preview PDF
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
PC-Based Controller for Shell and Tube Heat Exchanger
...Show More Authors

PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Linear Feedback Shift Registers-Based Randomization for Image Steganography
...Show More Authors

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref