Preferred Language
Articles
/
joe-113
A Hybrid Coefficient Decimation- Interpolation Based Reconfigurable Low Complexity Filter Bank for Cognitive Radio

Non uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band attenuation (SA). The proposed architecture is able to realize a greater number of sub-bands locations. The proposed (HCDIM) based (FB) shows an inherent low complexity offered by the (CIM) technique when compared with the alternative FBs. The reduction in the number of multiplications is by 50.77% compared with ICDM in non-uniform channelization, while the reduction in the number of multiplications is about 59.64% over the discrete Fourier transform (DFTFB) and 31.19% over ICDM based FB in uniform channelization.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
An Improve Image Encryption Algorithm Based on Multi-level of Chaotic Maps and Lagrange Interpolation

Currently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Mass Transfer Coefficient During Cathodic Protection of Low Carbon Steel in Seawater

The aim of this research is to calculate mass transfer coefficient, kd, during cathodic protection of low carbon steel in neutral seawater (3.5% W/V NaCl in distilled water with pH = 7). Two types of cathodic protection were used:

First: Sacrificial anode cathodic protection (SACP) were a pipeline of steel carrying seawater  using zinc as a sacrificial anode and with variable temperatures ranged (0 – 45oC) and volumetric flow rate ranged (5 – 900 lit/hr). It was found that the kd increases with increasing temperature and volumetric flow rate of seawater, where kd ranged (0.24×10-6 – 41.6×10-6 m/s).

Second: Impressed current cathodic pr

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 21 2021
Journal Name
Journal Of Healthcare Engineering
Complexity and Entropy Analysis to Improve Gender Identification from Emotional-Based EEGs

Investigating gender differences based on emotional changes becomes essential to understand various human behaviors in our daily life. Ten students from the University of Vienna have been recruited by recording the electroencephalogram (EEG) dataset while watching four short emotional video clips (anger, happiness, sadness, and neutral) of audiovisual stimuli. In this study, conventional filter and wavelet (WT) denoising techniques were applied as a preprocessing stage and Hurst exponent

... Show More
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
Crossref
View Publication
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Retrieval Based on Coefficient Correlation Index

Image retrieval is an active research area in image processing, pattern recognition, and
computer vision. In this proposed method, there are two techniques to extract the feature
vector, the first one is applying the transformed algorithm on the whole image and the second
is to divide the image into four blocks and then applying the transform algorithm on each part
of the image. In each technique there are three transform algorithm that have been applied
(DCT, Walsh Transform, and Kekre’s Wavelet Transform) then finding the similarity and
indexing the images, useing the correlation between feature vector of the query image and
images in database. The retrieved method depends on higher indexing number. <

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jul 17 2019
Journal Name
Aip Conference Proceedings
The interpolation effect on the spare sinogram for 3D image reconstruction

The effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.

Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Intelligent Automation &amp; Soft Computing
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Hybrid Algorithm for Generate Database Index Key Based on Image Contents

  This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys)  of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simulation Expirment for Proofing the Theoretical Assumption of Time Complexity for Binary Search Tree

      It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree).  This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method  to prove th

... Show More
View Publication Preview PDF