Preferred Language
Articles
/
FIbIn4YBIXToZYALRJus
Proposed different relay selection schemes for improving the performance of cooperative wireless networks
...Show More Authors

Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
2013 Ieee International Conference On Circuits And Systems (iccas)
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
...Show More Authors

The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Performance Assessment of Pile Models Chemically Grouted by Low-Pressure Injection Laboratory Device for Improving Loose Sand
...Show More Authors

The complexity and partially defined nature of jet grouting make it hard to predict the performance of grouted piles. So the trials of cement injection at a location with similar soil properties as the erecting site are necessary to assess the performance of the grouted piles. Nevertheless, instead of executing trial-injected piles at the pilot site, which wastes money, time, and effort, the laboratory cement injection devices are essential alternatives for evaluating soil injection ability. This study assesses the performance of a low-pressure laboratory grouting device by improving loose sandy soil injected using binders formed of Silica Fume (SF) as a chemical admixture (10% of Ordinary Portland Cement OPC mass) to di

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Computers And Concrete
Improving the seismic performance of reinforced concrete frames using an innovative metallic-shear damper
...Show More Authors

Scopus (11)
Scopus
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Engineering And Technology Journal
A Proposed Method for the Sound Recognition Process
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Multifactor Algorithm for Test Case Selection and Ordering
...Show More Authors

Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Bit Record Analysis for Bits Evaluating and Selection
...Show More Authors

The bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about  the used weight on bit  WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Proximal schemes by family of szl –widering mappings
...Show More Authors
Abstract<p>in this paper, we give a concept of <italic>szl</italic> –widering mapping which is independent of nonspreading mappings, <italic>k</italic> – strictly pseudo nonspring mappings and nonexpansive mappings. Also we introduce a new proximal point schemes of resolvent and <italic>szl</italic> –widering mappings. On the other hand, we discuss that the weak and strong convergence for these proximal point schemes in real Hilbert space under different conditions to asymptotic common fixed point of <italic>szl</italic> –widering mappings.</p>
View Publication
Scopus (5)
Scopus Crossref