Preferred Language
Articles
/
7xdrUpEBVTCNdQwC85TD
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code …

Scopus Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
Implementation and performance evaluation of multi level pseudo random sequence generator
...Show More Authors

In this paper, introduce a proposed multi-level pseudo-random sequence generator (MLPN). Characterized by its flexibility in changing generated pseudo noise (PN) sequence according to a key between transmitter and receiver. Also, introduce derive of the mathematical model for the MLPN generator. This method is called multi-level because it uses more than PN sequence arranged as levels to generation the pseudo-random sequence. This work introduces a graphical method describe the data processing through MLPN generation. This MLPN sequence can be changed according to changing the key between transmitter and receiver. The MLPN provides different pseudo-random sequence lengths. This work provides the ability to implement MLPN practically

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Performance of reinforced concrete non-prismatic beams having multiple openings configurations
...Show More Authors
Abstract<p>This experimental study demonstrates the gable-reinforced concrete beams’ behavior with several number of openings (six and eight) and posts’ inclination, aimed to find the strength reduction in this type of beam. The major results found are: for the openings extending over similar beam length it is better to increase the number of posts (openings), <italic>i.e.</italic>, increasing opening number led to decrease in opening area, which allows us to transmit stresses and act as lever arms between the upper and the lower chords. Also, findings revealed that the inclined posts have larger loading at the mid-point relative to vertical ones. For gables with vertical posts hav</p> ... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jan 10 2020
Journal Name
Fibers
CFRP Laminates Reinforcing Performance of Short-Span Wedge-Blocks Segmental Beams
...Show More Authors

Two of the main advantages of segmental construction are economics, as well as the rapid construction technique. One of the forms of segmental construction, for structural elements, is the segmental beams that built-in short sections, which referred to segments. This research aims to exhibit a new technique for the fabrication of short-span segmental beams from wedge-shaped concrete segments and carbon fiber reinforced polymers (CFRP) in laminate form. The experimental campaign included eight short-span segmental beams. In this study, two selected parameters were considered. These parameters are; the number of layers of CFRP laminates and the adhesive material that used to bond segments to each other, forming short-span segmental be

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Evaluation The Performance Geodetic of the Receivers Using Static Positioning Technique
...Show More Authors

Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fi

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Evaluation of Traffic Performance of Ahmed Urabi Square in Baghdad City
...Show More Authors

At present, smooth movement on the roads is a matter which is needed for each user. Many roads, especially in urban areas geometrically improved because of the number of vehicles increase from time to time.

In this research, Highway capacity software, HCS, 2000, will be adopted to determine the effectiveness of roundabout in terms of capacity of roundabout, delay and level of service of roundabout.

The results of the analysis indicated that the Ahmed Urabi roundabout operates under level of service F with an average control delay of 300 seconds per vehicle during the peak hours.

The through movements of Alkarrada- Aljadiriya direction (Major Direction) represent the heaviest traff

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Comparison Between the Performance of Human Translators and AI-Supported Applications
...Show More Authors

This study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research &amp; Development
Hemodialysis Nurses’ Practices toward Hand Hygiene Performance at Baghdad Teaching Hospitals
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering Science And Technology
THERMAL PERFORMANCE OF MULTIPLE- PASS SOLAR AIR HEATER WITH PIN FINS
...Show More Authors

Scopus (7)
Scopus
Publication Date
Sun Jun 01 2025
Journal Name
Results In Engineering
Structural Performance of Rail Connections: Experimental Testing and Finite Element Modeling
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref