Preferred Language
Articles
/
7xdrUpEBVTCNdQwC85TD
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code …

Scopus Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Structured Educational Program on Nurses’ Practices Concerning Therapeutic Communication at Cardiac Care Units in Holy Karbala Governorate Hospitals
...Show More Authors

Abstract
Objectives: This study aimed to evaluate the effectiveness of an educational program on nurses' practices concerning therapeutic communication.
Methodology: A quasi experimental design was carried out at Karbala Center for Cardiac Diseases and Surgery, Imam Hussein Medical City and Al-Handia General Hospital for period 10th June 2017 to the 15th of August 2018.
The program and instruments were constructed and developed by the researcher to measure the purpose of the study. Purposive sample comprised of (57) nurses were divided into two groups, study and control groups. The questionnaire consisted from two parts, first part is related to nurses' demographic characteristics and second part which include practices checkl

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Remittances Review
Analyzing the Influence of Information and Communication Technologies (ICT) on the Per Capita GDP of Iraq from 2004 to 2021
...Show More Authors

The study aims to identify the theoretical literature for all the variables of the study (ICT, GDP) as well as to identify the practical side of the impact of ICT on the per capita GDP in Iraq for the period (2004-2021). The study was based on the hypothesis that ICT impacts per capita GDP in Iraq. The problem of the study was to answer the question: does ICT contribute to per capita GDP? The study concluded that an increase in the rate of internet users per 100 people by one unit would increase. Increasing the landline telephone rate per 100 people by one unit will increase GDP per capita. In addition, increasing the mobile phone rate per 100 people by one unit will increase GDP per capita. The study recommended adopting rational poli

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Water Quality Assessment for Tigris River Through Salah Al-Din Province, Iraq Using Remote Sensing Techniques
...Show More Authors

water quality assessment is still being done at specific locations of major concern. The use of Geographical Information System (GIS) based water quality information system and spatial analysis with Inverse Distance Weighted interpolation enabled the mapping of water quality indicators along Tigris river in Salah Al-Din government, Iraq. Water quality indicators were monitored by taking 13 river samples from different locations along the river during Winter season year 2020. Maps of 10 water quality indicators. This meant that the specific water quality indicator and diffuse pollution characteristics in the basin were better illustrated with the variations displayed along the course of the river than conventional line graphs. Creation of

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Prediction of Sediment Accumulation Model for Trunk Sewer Using Multiple Linear Regression and Neural Network Techniques
...Show More Authors

Sewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated.  For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos

... Show More
View Publication
Scopus (18)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref