Preferred Language
Articles
/
QxflN48BVTCNdQwCHWNS
Enhancing BER Performance Limit of BCH and RS Codes Using Multipath Diversity
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Sep 21 2013
Journal Name
Nonlinear Dynamics
BER performance enhancement for secure wireless optical communication systems based on chaotic MIMO techniques
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Analysis for Hybrid Massive MIMO FSO/RF Links Based on Efficient Channel Codes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Nov 07 2023
Journal Name
Innovative Infrastructure Solutions
Enhancing load-bearing performance of hybrid recycled aggregate concrete-filled columns using SBR, steel fibers and polypropylene fibers
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Chaotic behaviour of the Rossler model and its analysis by using bifurcations of limit cycles and chaotic attractors
...Show More Authors

The behaviour of certain dynamical nonlinear systems are described in term as chaos, i.e., systems' variables change with the time, displaying very sensitivity to initial conditions of chaotic dynamics. In this paper, we study archetype systems of ordinary differential equations in two-dimensional phase spaces of the Rössler model. A system displays continuous time chaos and is explained by three coupled nonlinear differential equations. We study its characteristics and determine the control parameters that lead to different behavior of the system output, periodic, quasi-periodic and chaos. The time series, attractor, Fast Fourier Transformation and bifurcation diagram for different values have been described.

View Publication
Scopus (36)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the internal audit in the performance enhancing
...Show More Authors

  After the internal audit as a tool of internal control in any organization, and helps in the evaluation of all internal control activities, as a tool to ensure compliance with the plans and policies to achieve the goals of the institution as much as possible of the efficiency, effectiveness, and should have the Internal Audit full independence and is linked to senior management, and aims to get the credibility and accuracy of information and data, and keep abreast of modern developments.

  The practical side includes the preparation of the questionnaire, which included a set of questions that fit the hypothesis of the research, was Tozeiha the research sample consisting of employees of the Internal Audit Department an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of e-government in enhancing the institutional performance
...Show More Authors

Abstract

The research aims to study the role of e-government in enhancing institutional performance. The dimensions of e-government are: (support and commitment of senior management, technical structures, organization and human resources, knowledge and information, work procedures, attention to citizens' satisfaction, and client parties),while the dimensions of institutional performance are: (Service improvement, innovation, efficiency and effectiveness).

The research used electronic questionnaire as a main tool for data collection, The questionnaire included all the employees in the e-government project in Department of Government Coordinate and Citizen Affairs at the General Secretariat of the C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Projective MDS Codes Over GF(27)‎
...Show More Authors

MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix.   In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over  of length  and 28 have been found.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref