Preferred Language
Articles
/
ZULPmpoBMeyNPGM3RM4K
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 28 2024
Journal Name
Journal Of Advances In Information Technology
Enhancement of Recommendation Engine Technique for Bug System Fixes
...Show More Authors

This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 25 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics Vol
Predicate the Ability of Extracorporeal Shock Wave Lithotripsy (ESWL) to treat the Kidney Stones by used Combined Classifier
...Show More Authors

Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or tousing another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto

... Show More
View Publication Preview PDF
Scopus (7)
Scopus
Publication Date
Sun Jun 15 2025
Journal Name
Iraqi Journal Of Laser
Performance Enhancement of Metasurface Grating Polarizer Using Deep Learning for Quantum Key Distribution Systems
...Show More Authors

Metasurface polarizers are essential optical components in modern integrated optics and play a vital role in many optical applications including Quantum Key Distribution systems in quantum cryptography. However, inverse design of metasurface polarizers with high efficiency depends on the proper prediction of structural dimensions based on required optical response. Deep learning neural networks can efficiently help in the inverse design process, minimizing both time and simulation resources requirements, while better results can be achieved compared to traditional optimization methods. Hereby, utilizing the COMSOL Multiphysics Surrogate model and deep neural networks to design a metasurface grating structure with high extinction rat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 18 2025
Journal Name
Pattern Recognition And Artificial Intelligence
Utilizing Energy-Efficient Deep Learning Technique for Age Estimation Through a Hybrid Methodology
...Show More Authors

This study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce

... Show More
View Publication
Crossref
Publication Date
Fri Dec 06 2019
Journal Name
Ssociation Of Arab Universities Journal Of Engineering Sciences
Application of Artificial Neural Network and GeographicalInformation System Models to Predict and Evaluate the Quality ofDiyala River Water, Iraq
...Show More Authors

This research discusses application Artificial Neural Network (ANN) and Geographical InformationSystem (GIS) models on water quality of Diyala River using Water Quality Index (WQI). Fourteen water parameterswere used for estimating WQI: pH, Temperature, Dissolved Oxygen, Orthophosphate, Nitrate, Calcium, Magnesium,Total Hardness, Sodium, Sulphate, Chloride, Total Dissolved Solids, Electrical Conductivity and Total Alkalinity.These parameters were provided from the Water Resources Ministryfrom seven stations along the river for the period2011 to 2016. The results of WQI analysis revealed that Diyala River is good to poor at the north of Diyala provincewhile it is poor to very polluted at the south of Baghdad City. The selected parameters wer

... Show More
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Geological Journal
A Review of Historical Studies for Water Saturation Determination Techniques
...Show More Authors

Water saturation is the most significant characteristic for reservoir characterization in order to assess oil reserves; this paper reviewed the concepts and applications of both classic and new approaches to determine water saturation. so, this work guides the reader to realize and distinguish between various strategies to obtain an appropriate water saturation value from electrical logging in both resistivity and dielectric has been studied, and the most well-known models in clean and shaly formation have been demonstrated. The Nuclear Magnetic Resonance in conventional and nonconventional reservoirs has been reviewed and understood as the major feature of this approach to estimate Water Saturation based on T2 distribution. Artific

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref