Preferred Language
Articles
/
8hdsUpEBVTCNdQwC85Q7
Implementation of digital chaotic signal generator based on reconfigurable LFSRs for multiple access communications
...Show More Authors

This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Recent investigations show that wireless communication systems are very promising application area of chaotic dynamics. A feature of chaotic signals is super wide bandwidth; the power spectrum extends both to the region of very low frequencies as well as to high frequencies. For the proposed system, the bandwidth is extended from approximately 100 Hz to 50 MHz. The nature of chaotic signal is an aperiodic. Therefore, the resolution of the proposed system is high to provide an aperiodicity of the chaotic signal. In practice the following simulation results on MATLAB software platform show that the effectiveness of the model described which has low-cross-correlation and can meet the actual need. Simulation results show sequence length in 264-1-bit with cross-correlation less than 0.0025 for our architecture.

Scopus
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Digital Economy in Iraqi Economic Growth for The Period of 2010-2022 (Analytical Study)
...Show More Authors

The research addresses the role of the digital economy in the growth of the Iraqi economy during the period from 2010 to 2022. The research is based on the hypothesis that the digital economy has become one of the primary growth drivers worldwide and has a close relationship with economic development. Therefore, the digital transformation in Iraq can accelerate bridging developmental gaps with other countries.

It has become evident that the Iraqi economy suffers from structural imbalances for various reasons, hindering economic growth. These reasons include political and economic factors, as well as the absence of a well-thought-out policy to promote the agricultural sector, which is considered one of the fundamental sectors capa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Detecting Outliers In Multiple Linear Regression
...Show More Authors

It is well-known that the existence of outliers in the data will adversely affect the efficiency of estimation and results of the current study. In this paper four methods will be studied to detect outliers for the multiple linear regression model in two cases :  first, in real data; and secondly,  after adding the outliers to data and the attempt to detect it. The study is conducted for samples with different sizes, and uses three measures for  comparing between these methods . These three measures are : the mask, dumping and standard error of the estimate.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Medical Journal Of Babylon
Plasma Sclerostin Level in Multiple Myeloma
...Show More Authors
Background:

Multiple myeloma (MM) is a heterogenous plasma cell malignancy with various complications. Sclerostin is a Wingless-type (Wnt) inhibitor specifically expressed by osteocytes; it acts as a negative regulator of bone formation.

Objectives:

To assess plasma sclerostin level in MM patients and find its correlations with clinical and laboratory data, including osteolytic bone disease and international staging system (ISS).

Materials and Methods:

This cr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Artificial Intelligence
Recursive Multi-Signal Temporal Fusions With Attention Mechanism Improves EMG Feature Extraction
...Show More Authors

View Publication
Scopus (38)
Crossref (35)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
From Structure to the Signal (Text and Discourse in the Semiotic Analysis)
...Show More Authors

Care and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.

We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Engineering
Software Implementation of Binary BCH Decoder Using Microcontroller
...Show More Authors

In this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.

 

 

View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Implementation within strategic planning and its impact on banking service quality: (An applied research on a sample of Iraqi banks)
...Show More Authors

In the midst of rapid changes and difficultiesand the tough competition faced by the Iraqi banks, it has become necessary to focus on a significant aspect of administrative work; that is strategic planning and the key role of implementation within this process in improving the banking service quality. It has emerged as a critical and main competitive weapon for distinguishing the services provided by banks from each other in an effort to participate in increasing market share of the bank in question in question; in its growth, continuation and profit increase.

The research has addressed the relation between the independent variable (implementation within strategic planning), and the dependent variable (banking service quality and

... Show More
View Publication
Crossref