Preferred Language
Articles
/
alkej-590
New Adaptive Data Transmission Scheme Over HF Radio
...Show More Authors

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) for each channel in the frequency list. Channel condition evaluation is done by two arrangements. In the first an FFT analysis is used where a pilot signal is transmitted over the channel, while the data itself is used in the second arrangement. Passive channel assessment is used to avoid bad channels hence limiting the frequency pool size to be used in the point to point communication and the time required for  scanning and linking. An exchange of channel information between the transmitting and receiving stations is considered to select the modulation scheme for transmission. Mainly MPSK and MFSK are considered with different levels giving different data rate according to the channel condition. The results of the computer simulation have shown that when transmitting at a fixed channel symbol rate of 1200 symbol/sec, the information rate ranges from 2400 bps using 4FSK up to 3600 bps using 8PSK for SNR ranges from 11dB up to 26dB.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
The Combined Effect of Q-Switched Nd:YAG Laser (532 Nm) and Safranin O on the Growth of Pseudomonas Aeruginosaand its Susceptibilityto Antibiotics and Pyocyanin Production
...Show More Authors

Twenty five samples out of sixty wound swabs taken from burn patients were identified as P. aeruginosabacteria by conventional methods. Antibiotics susceptibility tests were performed against thirteen antibiotics. P. aeruginosa samples were treated with 0.5 mg/ml of Safranin O solution then irradiated with 532nm Q-switched Nd:YAG laser at four energy densities (0.324, 0.704, 1.380, and 1.831 J/cm2) for different times of 5, 8 and 11 minutes with 5Hz repetition rate. The viability, susceptibility to antibiotic and production of pyocyanin were determined before and after irradiation. The results showed that the number of CFU/ml of P. aeruginosa decreased with increasing the dose of irradiation. Complete killing of cells was observed at 1.8

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Spectrophotometric and Reverse Flow Injection Method Determination of Nitrazepam in Pharmaceuticals Using O-Coumaric Acid as a New Chromogenic Reagent
...Show More Authors

            A spectrophotometric- reverse flow injection analysis (rFIA) method has been proposed for the   determination of Nitrazepam (NIT) in pure and pharmaceutical preparations. The method is based upon the coupling reaction of NIT with a new reagent O-Coumaric acid (OCA) in the presence of sodium periodate in an aqueous solution. The blue color product was measured at 632 nm. The variation (chemical and physical parameters) related with reverse flow system were estimated. The linearity was over the range 15 - 450 µg/mL of NIT with detection limits and limit of quantification of 3.425 and 11.417 µg mL-1 NIT,respectively. The sample throughput of 28 samples

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Numerical scheme to Solve Boundary Value Problems Involving Singular Perturbation
...Show More Authors

The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme
...Show More Authors

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Wireless Networks
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication

... Show More
View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Proposing a Scheme for Human Interactive Proof Test using Plasma Effect
...Show More Authors

            Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Document retrieval using term term frequency inverse sentence frequency weighting scheme
...Show More Authors

The need for an efficient method to find the furthermost appropriate document corresponding to a particular search query has become crucial due to the exponential development in the number of papers that are now readily available to us on the web. The vector space model (VSM) a perfect model used in “information retrieval”, represents these words as a vector in space and gives them weights via a popular weighting method known as term frequency inverse document frequency (TF-IDF). In this research, work has been proposed to retrieve the most relevant document focused on representing documents and queries as vectors comprising average term term frequency inverse sentence frequency (TF-ISF) weights instead of representing them as v

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref