Preferred Language
Articles
/
alkej-588
Design and Simulation of GaussianFSK Transmitter in UHF Band Using Direct Modulation of ΣΔ Modulator Fractional-N Synthesizer
...Show More Authors

This research involves design and simulation of GaussianFSK transmitter in UHF band using direct modulation of ΣΔ  fractional-N synthesizer with the following specifications:

Frequency range (869.9– 900.4) MHz, data rate 150kbps, channel spacing (500 kHz), Switching time 1 µs, & phase noise @10 kHz = -85dBc.

New circuit techniques have been sought to allow increased integration of radio transmitters and receivers, along with new radio architectures that take advantage of such techniques. Characteristics such as low power operation, small size, and low cost have become the dominant design criteria by which these systems are judged.

A direct modulation by ΣΔ  fractional-N synthesizer is proposed in this research, because this approach provides the required characteristics such as low power. The Σ∆ modulator placed on digital phase-locked loop to control the fractional value of the frequency division ratio thereby eliminating spurious and allowing good phase noise performance. The modulation type of Gaussian FSK is used to obtain high spectral efficiency of modulated waveform.

The applications of this transmitter in low cost wireless data transfer, security systems, RF remote controls and wireless metering.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2026
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Hemorrhoidectomy Using (10600 nm) CO2 Laser
...Show More Authors

Hemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment, And Sustainability: Tmrees23fr
Hyperspectral pansharpening improvement using MNF transformation
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The use of metal in ancient Syria in the manufacture of jewelry (ornamental tools in the third and second millennium BC and the molds used in their manufacture)
...Show More Authors

 This research sheds light on the use of metal in the manufacture of jewelry, which is represented by ornamental tools in the period between the third and second millennium BC, in addition to the most important molds used in their manufacture. Man has been interested in metals since early ages, and was able to make tools that he uses in his daily life, especially jewelry. And the Syrian people got acquainted with the types of minerals, their characteristics, and how to deal with them. Minerals played an effective and prominent role in the economy of ancient Syria. Trade with those countries and secure their roads.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
The effect of left ventricle ischemia severity on cardiac performance appeared on ejection fraction using radioactive TC <sup>99m</sup> MIBI in comparison with echocardiography
...Show More Authors
Abstract<p>Ischemic heart disease is a major causes of heart failure. Heart failure patients have predominantly left ventricular dysfunction (systolic or diastolic dysfunction, or both). Acute heart failure is most commonly caused by reduced myocardial contractility, and increased LV stiffness. We performed echocardiography and gated SPECT with Tc<sup>99m</sup> MIBI within 263 patients and 166 normal individuals. Left ventricular end systolic volume (LVESV), left ventricular end diastolic volume (LVEDV), and left ventricular ejection fraction (LVEF) were measured. For all degrees of ischemia, there was a significant difference between ejection fraction values measured by SPECT and echo</p> ... Show More
View Publication
Scopus Crossref