Preferred Language
Articles
/
hxb4BIcBVTCNdQwCJS37
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems
...Show More Authors

Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date very challenging. Although advanced iterative algorithms have been developed to address this challenge, they exhibit slow convergence speed and thus deliver high latency and computational complexity. To overcome this challenge, we propose a computationally efficient conjugate gradient-descent (CGD) algorithm based on the Riemannian manifold in order to optimize the DL training sequence at base station (BS), while improving the convergence rate to provide a fast CSI estimation for an FDD m-MIMO system. To this end, the sum rate and the computational complexity performances of the proposed training solution are compared with the state-of-the-art iterative algorithms. The results show that the proposed training solution maximizes the achievable sum rate performance, while delivering a lower overall computational complexity owing to a faster convergence rate in comparison to the state-of-the-art iterative algorithms.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Random Number Generation for Quantum Key Distribution Systems Based on Shot-Noise Fluctuations in a P-I-N Photodiode
...Show More Authors

A simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.

View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
مجلة الجامعة العراقية
The competencies of lecturers and their roles in managing E-training workshops, a Pedagogical Pointview
...Show More Authors

The aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the

... Show More
View Publication
Publication Date
Wed Jan 01 2014
Journal Name
Scienceasia
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
linear equivalence determination of key-stream sequence using Z-Transform
...Show More Authors

the research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream

View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developing Systems Engineering for Sustainable Infrastructure Projects
...Show More Authors
Abstract<p>Globally, Sustainability is very quickly becoming a fundamental requirement of the construction industry as it delivers its projects; whether buildings or infrastructures. Throughout more than two decades, many modeling schemes, evaluation tools, and rating systems have been introduced en route to realizing sustainable construction. Many of these, however, lack consensus on evaluation criteria, a robust scientific model that captures the logic behind their sustainability performance evaluation, and therefore experience discrepancies between rated results and actual performance. Moreover, very few of the evaluation tools available satisfactorily address infrastructure projects. The res</p> ... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 01 2006
Journal Name
Journal Of Engineering
Effect of Transverse Base Width Restraint on the Cracking Behavior of Massive Concrete
...Show More Authors

The effect of considering the third dimension in mass concrete members on its cracking behavior is investigated in this study. The investigation includes thermal and structural analyses of mass concrete structures. From thermal analysis, the actual temperature distribution throughout the mass concrete body was obtained due to the generation of heat as a result of cement hydration in addition to the ambient circumstances. This was performed via solving the differential equations of heat conduction and convection using the finite element method. The finite element method was also implemented in the structural analysis adopting the concept of initial strain problem. Drying shrinkage volume changes were calculated using the procedure suggested

... Show More
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Effect of Transverse Base Width Restraint on the Cracking Behavior of Massive Concrete
...Show More Authors

The effect of considering the third dimension in mass concrete members on its cracking behavior is investigated in this study. The investigation includes thermal and structural analyses of mass concrete structures. From thermal analysis, the actual temperature distribution throughout the mass concrete body was obtained due to the generation of heat as a result of cement hydration in
addition to the ambient circumstances. This was performed via solving the differential equations of heat conduction and convection using the finite element method. The finite element method was also implemented in the structural analysis adopting the concept of initial strain problem. Drying shrinkage volume changes were calculated using the procedure sug

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref