Preferred Language
Articles
/
joe-113
A Hybrid Coefficient Decimation- Interpolation Based Reconfigurable Low Complexity Filter Bank for Cognitive Radio

Non uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band attenuation (SA). The proposed architecture is able to realize a greater number of sub-bands locations. The proposed (HCDIM) based (FB) shows an inherent low complexity offered by the (CIM) technique when compared with the alternative FBs. The reduction in the number of multiplications is by 50.77% compared with ICDM in non-uniform channelization, while the reduction in the number of multiplications is about 59.64% over the discrete Fourier transform (DFTFB) and 31.19% over ICDM based FB in uniform channelization.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 15 2023
Journal Name
Journal Of Robotics
A New Proposed Hybrid Learning Approach with Features for Extraction of Image Classification

Image classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class

... Show More
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Fme Transactions
FAT-based adaptive backstepping control of an electromechanical system with an unknown input coefficient

This paper is focused on orthogonal function approximation technique FAT-based adaptive backstepping control of a geared DC motor coupled with a rotational mechanical component. It is assumed that all parameters of the actuator are unknown including the torque-current constant (i.e., unknown input coefficient) and hence a control system with three motor control modes is proposed: 1) motor torque control mode, 2) motor current control mode, and 3) motor voltage control mode. The proposed control algorithm is a powerful tool to control a dynamic system with an unknown input coefficient. Each uncertain parameter/term is represented by a linear combination of weighting and orthogonal basis function vectors. Chebyshev polynomial is used

... Show More
Scopus (5)
Crossref (7)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Characteristics measurement of Baghdad University radio telescope for hydrogen emission line

The aim of this paper is to measure the characteristics properties of 3 m radio telescope that installed inside Baghdad University campus. The measurements of this study cover some of the fundamental parameters at 1.42 GHz. These parameters concentrated principally on, the system noise temperature, signal to noise ratio and sensitivity, half power beam width, aperture efficiency, and effective area. These parameters are estimated via different radio sources observation like Cas-A, full moon, sky background, and solar drift scan observations. From the results of these observations, these parameters are found to be approximately 64 K, 1.2, 0.9 Jansky, 3.7°, 0.54, and 3.8 m2 respectively. The parameters values have vital affect to quantitativ

... Show More
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun May 12 2019
Journal Name
Progress In Electromagnetics Research Letters
SOLAR MEASUREMENTS FOR 21 CM WAVELENGTH USING 3 M RADIO TELESCOPE

Solar hydrogen line emission has been observed at the frequency of 1.42 GHz (21 cm wavelength) with 3m radio telescope installed inside the University of Baghdad campus. Several measurements related to the sun have been conducted and computed from the radio telescope spectrometer. These measurements cover the solar brightness temperature, antenna temperature, solar radio flux, and the antenna gain of the radio telescope. The results demonstrate that the maximum antenna temperature, solar brightness temperature, and solar flux density are found to be 970 K, 49600K, and 70 SFU respectively. These results show perfect correlation with recent published studies.

Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Collaboration And Integration In Construction, Engineering, Management And Technology
Scopus (2)
Scopus Crossref
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Technique For Image De-blurring Using Adaptive Wavelet Lagrange Fuzzy Filter

A new de-blurring technique was proposed in order to reduced or remove the blur in the images. The proposed filter was designed from the Lagrange interpolation calculation with adjusted by fuzzy rules and supported by wavelet decomposing technique. The proposed Wavelet Lagrange Fuzzy filter gives good results for fully and partially blurring region in images.
 

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
2018 2nd Ieee Advanced Information Management,communicates,electronic And Automation Control Conference (imcec)
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More