Preferred Language
Articles
/
KhcsXZIBVTCNdQwCIK5X
Performance Improvement of Multi-UserMC-CDMA system Using Discrete Hartly Transform Mapper

Future wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation results are provided to demonstrate that the proposed system improves the BER performance and reduce the constellation energy as compared with the conventional system Keywords

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

Crossref
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Performance evolution of a hybrid thermal solar air conditioning system and compare it with a traditional system according to Iraq weather

In a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amou

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Improvement of the physical, mechanical and thermal insulation properties to produce gypsum boards by using waste materials

In this paper, a study of improving the physical properties, mechanical and thermal insulation are conducted to produce gypsum boards with lightweight from waste materials. These boards can be used as an internal packaging wall or partitions tile of non-Bering with a high thermal insulation. Gypsum plaster mixed with waste material like (PET Polyethylene terephthalate, sawdust in size4.75mm and rubber) in different ratio (5%, 7%, 10%, 15%, 20%, 25%and 30%) of plaster to produce boards and then to find out the effect of these materials on the properties of boards, so that tests of consistency, setting time, flexural strength, density and thermal conductivity were achieved for all samples to find out this effect. The result shows that the

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Solid Waste Treatment Using Multi-Criteria Decision Support Methods Case Study Lattakia City

Lattakia city faces many problems related to the mismanagement of solid waste, as the disposal process is limited to the random Al-Bassa landfill without treatment. Therefore, solid waste management poses a special challenge to decision-makers by choosing the appropriate tool that supports strategic decisions in choosing municipal solid waste treatment methods and evaluating their management systems. As the human is primarily responsible for the formation of waste, this study aims to measure the degree of environmental awareness in the Lattakia Governorate from the point of view of the research sample members and to discuss the effect of the studied variables (place of residence, educational level, gender, age, and professional status) o

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 10 2019
Journal Name
Journal Of Engineering And Applied Sciences
Crossref
View Publication
Publication Date
Thu Dec 14 2023
Journal Name
Iete Journal Of Research
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
An Investigation into Thermal Performance of Mist Water System and The Related Consumption Energy

Experimental tests were conducted to investigate the thermal performance (cooling effect) of water mist system consisting of 5μm volume median diameter droplets in reducing the heat gain entering a room through the roof and the west wall by reducing the outside surface temperature due to the evaporative cooling effect during the hot dry summer of Baghdad/Iraq. The test period
was Fifty one days during the months May, June, and July 2012. The single test day consists of 16 test hours starting from 8:00 am to 12:00 pm. The results showed a reduction range of 1.71 to 15.5℃ of the roof outside surface temperature and 21.3 to 76.6% reduction in the daily heat flux entering the room through the roof compared with the case of not using w

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
The performance of a passively Q-switched Cr:YAG4+ in an end- pumped laser system

A characteristic study of a passively Q-switched diode pumped solid state laser system is presented in this work. For laser a comparison study for the theoretically calculated results with a simulation results using a software which calculates the Q-switched solid state laser parameters was such as energy, peak power and pulse width were performed. There was a good agreement between our theoretical calculations and the simulation values.

View Publication Preview PDF