Preferred Language
Articles
/
7BdrUpEBVTCNdQwCNpT0
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) with 2×1 and 2×2 Alamouti schemes for different chaotic maps over wireless channels has been studied. It has been shown that the use of these schemes can …

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Aug 02 2025
Journal Name
Opción: Revista De Ciencias Humanas Y Sociales, Issn 1012-1587, Nº. Extra 21, 2019, Págs. 907-927
The Effect Of The Perkins’ And Blythe’s Model On Mathematical Communication Among Students Of The 5Th Bio Scientific Grade In Mathematics
...Show More Authors

Autorías: Muayad Kadhim Raheem, Lina Fouad Jawad. Localización: Opción: Revista de Ciencias Humanas y Sociales. Nº. 21, 2019. Artículo de Revista en Dialnet.

View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Mural Photography Techniques: منى حيدر علي
...Show More Authors

The study aimed to study the role of technology in the production of the mural photography, and to develop its concept to the viewer, through the achievement of the aesthetic and functional vision. Through this study, some types of these techniques, which are organically related to architecture, were identified.

The mural photography includes a huge amount of techniques, and methods, and the researcher presented them through five techniques: (AlTamira, Alfresk, acrylic, mosaic, and glass art, which takes the architectural character.

The research consists of:

Methodological framework: research problem, research objectives, research limits, importance of research, and definition of terms.

Theoretical framewo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 04 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Dissolution Enhancement of Raltegravir by Hot Melt Extrusion Technique
...Show More Authors

The objective of the study to develop an amorphous solid dispersion for poorly soluble raltegravir by hot melt extrusion (HME) technique. A novel solubility improving agent plasdone  s630 was utilized. The HME raltegravir was formulated into tablet by direct compression method. The prepared tablets were assessed for all pre and post-compression parameters. The drug- excipients interaction was examined by FTIR and DSC. All formulas displayed complying with pharmacopoeial measures. The study reveals that formula prepared by utilizing drug and plasdone S630 at 1:1.5 proportion and span 20 at concentration about 30mg (trail-6) has given highest dissolution rate than contrasted with various formulas of raltegravir.

Keywor

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Behavioral Approach In Financial Reporting Enhancement
...Show More Authors

 This study seeks to highlights on the behavioral approach in organization theory as modern and effective entrance in constructing this theory and reflection extent on the behavior of both the product and the information user (accountant and financial information).

 The study also focus on behavioral approach role in consolidating accounting concepts through making harmony between them so that the accountant can influence the user behavior with the concepts and principles of accounting in an effort to provide quality characteristic of accounting information produced by him in consistent with his behavior and information user and its impact on the decision making process by the latter.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhancement of self-healing to mechanical properties of concrete
...Show More Authors
Abstract<p>Concrete is the main construction material of many structures. Exposing to loads creates cracks in concrete, which reduce the performance and durability. The decrease of concrete cracks becomes a necessity demand to ensure more durability and structural integrity of the concrete structure. Autogenous healing concrete is a kind of new smart concretes, which has the ability to reclose its cracks by means of itself. Concrete self-healing is a type of free repairs processes, which is reduce direct and indirect cost of maintenance and repairing. This work targets to inspect the mechanical properties of concrete after using two combinations of two materials (20 kg/m3 calcium hydroxide Ca(OH</p> ... Show More
Crossref (1)
Clarivate Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
AGENT BASED MONITORING FOR INVESTIGATION PROCESS AND MAINTENANCE IMPROVEMENT
...Show More Authors

Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
PC-Based Controller for Shell and Tube Heat Exchanger
...Show More Authors

PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f

... Show More
View Publication Preview PDF