Preferred Language
Articles
/
alkej-588
Design and Simulation of GaussianFSK Transmitter in UHF Band Using Direct Modulation of ΣΔ Modulator Fractional-N Synthesizer
...Show More Authors

This research involves design and simulation of GaussianFSK transmitter in UHF band using direct modulation of ΣΔ  fractional-N synthesizer with the following specifications:

Frequency range (869.9– 900.4) MHz, data rate 150kbps, channel spacing (500 kHz), Switching time 1 µs, & phase noise @10 kHz = -85dBc.

New circuit techniques have been sought to allow increased integration of radio transmitters and receivers, along with new radio architectures that take advantage of such techniques. Characteristics such as low power operation, small size, and low cost have become the dominant design criteria by which these systems are judged.

A direct modulation by ΣΔ  fractional-N synthesizer is proposed in this research, because this approach provides the required characteristics such as low power. The Σ∆ modulator placed on digital phase-locked loop to control the fractional value of the frequency division ratio thereby eliminating spurious and allowing good phase noise performance. The modulation type of Gaussian FSK is used to obtain high spectral efficiency of modulated waveform.

The applications of this transmitter in low cost wireless data transfer, security systems, RF remote controls and wireless metering.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Production of Bioethanol from Waste Potatoes
...Show More Authors

In this research, production of ethanol from waste potatoes fermentation was studied using Saccharmyses cerevisiae. Potato Flour was prepared from potato tubers after cooking and drying at 85°C. Homogenous slurry of potato flour was prepared in water at solid liquid ratio 1:10. Liquefaction of potato flour slurry with α-amylase at 80°C for 40 min followed by saccharification with glucoamylase at 65°C for 2 hr .Fermentation of hydrolysate with Saccharomyces cerevisiae at 35°C for two days resulted in production of 33 g/l ethanol.

      The parameters studied were; temperature, time of fermentation and pH. It was found that Saccharification process is affected by enzyme Amylo 300 conc

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating the quality of educational services according to the modified Servqual modelStudy of a sample of students of the Faculty of Management and Economics / University of Baghdad
...Show More Authors

The research aims to apply a modified SERVQUAL model to evaluate the quality of the educational services via conducting exploratory research for students from the College of Administration and Economics- Department of Business Administration- Evening studies at the University of Baghdad. Questionnaire of two parts was distributed to a sample of (72) students out of (720) students of the 2nd.,3rd. and 4th. year in the beginning of the second semester of the year 2008-2009 to measure the expectations and perceptions to the quality of the educational services. Five major dimensions were analyzed to see the gaps for (22) variables. The study concluded that there were (13) variables confirmed that the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of customer relationship Management on improving Financial Performance: An Applied Study in a Number of Iraq Private Banks
...Show More Authors

The research focuses on determining the role of customer relationship management in improving financial performance by surveying the opinions of a number of employees of a number of Iraqi private banks. The customer has become the focus of attention and the most important factors of success and profitability and competition. Therefore, decisions related to the customer are important decisions that support the process of making, And follow-up of administrative decisions, including financial decisions aimed at improving the financial performance of banks and distinguish them from competitors.    Thus, the techniques used in customer relations management programs to collect, analyze and use data and information have beco

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Chapter of the provisions of information to explain the fundamentals of the religion of Sheikh Abdul Rahman bin Abdullah al-Khunji: Study and achieve
...Show More Authors

Every student and researcher is aware of the practical importance of manuscripts and intellectual need
In order to look at the legacy of the world of thought, this is the book of the fundamentals of religion for knowledge
Al-Razi (d. 606 AH), is included in the book
Very within the total books of doctrine and circulated speech. Q
The thickness of the khongi bush was accurate and reliable, and it was transportation
Accompanied by an extension in the presentation of issues and deepening the places of Khmel if any, and appeared
In support of Al-Razi's pride in most places and most of the issues
Other speech teams from Mu'tazilis and others and presented a general demonstration of knowledge
And the ability to learn ab

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology &amp; Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Tissue Welding Using (800±10nm) Diode and (1064nm) Nd: YAG Lasers
...Show More Authors

Joining tissue is a growing problem in surgery with the advancement of the technology and more precise and difficult surgeries are done. Tissue welding using laser is a promising technique that might help in more advancement of the surgical practice. Objectives: To study the ability of laser in joining tissues and the optimum parameters for yielding good welding of tissues. Methods: An in-vitro study, done at the Institute of Laser, Baghdad University during the period from October 2008 to February 2009. Diode and Nd-YAG lasers were applied, using different sessions, on sheep small intestine with or without solder to obtain welding of a 2-mm length full thickness incision. Different powers and energies were used to get maximum effect. Re

... Show More
View Publication Preview PDF