Preferred Language
Articles
/
joe-1286
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered  using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB  R  2011a  and system generator ISE14.1/SIMULINK.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
2014 Ieee 25th Annual International Symposium On Personal, Indoor, And Mobile Radio Communication (pimrc)
Percolation condition for interference-limited cognitive radio networks
...Show More Authors

In this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes

... Show More
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Certain subclass of meromorphic univalent positive coefficients defined by q-difference operator
...Show More Authors

This paper introduces a Certain Subclass of Meromorphic Univalent Positives Coefficients Defined by the q-Difference Operator. Coefficient estimates are investigated and obtained, and the upped bound is calculated.

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Usage of the visual elements in the interior designing of indoor swimming pools
...Show More Authors

The research specializes in (Usage of the visual elements in the interior designing of indoor swimming pools), the research seeks to provide a study that contributes to providing scientific and knowledge material, as a reference for researchers, students of interior design and architecture, and companies constructing indoor swimming pools.
The objective research is to detect the actual state of the interior design of the indoor swimming pools, and recognize the most important standards and techniques used in its design to provide appropriate design solutions if needed also Proposing a development proposals for the interior design of indoor swimming pools, the theoretical framework of this study, included two sections, The first one ta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
نسق
the effect of the semantic map strategy on predictive thinking among fifth grade femal students
...Show More Authors

Preview PDF
Publication Date
Sun Aug 18 2019
Journal Name
Political Sciences Journal
Strategic dimensions of the Turkish role in the map of international and regional forces balances
...Show More Authors

It is necessary to examine the nature of the Turkish position and what Turkey seeks to achieve at the international, regional and Iraqi levels. Or is this external role an expression of foreign policy and has not yet reached the level of maturity that reaches the stage of strategy? The answer to this question is the essence of research in the Turkish role. The answer to this question requires the realization of the elements and pillars that guarantee Turkey's continuity and survival. Continuity is a cornerstone of the strategy. The continuity of the role and its interaction with the event and the ability to employ multiple alternatives are what qualify the state to describe its politics. The external strategy has evolved into. In order t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
The Predication of the Type of Jupiter Radio Storm from Two Different Iraqi Locations
...Show More Authors

A program in Visual Basic language was designed to predict the type of radio storm that emitted from Jupiter at specific Local Time (LT) from two different Iraqi locations (Baghdad and Basra), such storms result from the Central Meridian Longitude (CML) of system ??? for Jupiter and phase of Io’s satellite (?Io). Some of these storms are related to position of Io (Io- A,B,C,D) and others are unrelated (non-Io-A,B,C,D) to its position. The input parameters for this program were user specified by determining the observer’s location (longitude), year, month and day. The output program results in form of tables provides the observer with information about the date and the LT of beginning and end of each type of emitted storm. Two Io-storm r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi Parametric Logistic Regression Model with the Outputs Representing Trapezoidal Intuitionistic Fuzzy Number
...Show More Authors

In this paper, the fuzzy logic and the trapezoidal fuzzy intuitionistic number were presented, as well as some properties of the trapezoidal fuzzy intuitionistic number and semi- parametric logistic regression model when using the trapezoidal fuzzy intuitionistic number. The output variable represents the dependent variable sometimes cannot be determined in only two cases (response, non-response)or (success, failure) and more than two responses, especially in medical studies; therefore so, use a semi parametric logistic regression model with the output variable (dependent variable) representing a trapezoidal fuzzy intuitionistic number.

the model was estimated on simulati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 07 2018
Journal Name
Proceedings Of The 2018 4th International Conference On Mechatronics And Robotics Engineering
Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The communication effectiveness of designing and producing digital newspapers associated with infographics
...Show More Authors

As a result of the developments that occurred in technological and digital technologies, which had a fundamental role in changing the paths of science, including the sciences of communication and the art of design, especially since these developments were the result of the information revolution, which called for the need to find alternatives that contribute to organizing presentations of information and texts in accordance with the manufacture of constructive content to deliver A communication message for the recipient to achieve culture and communication together, as it has become necessary to employ technical and digital developments in organizing that information according to the rules and laws of design and producing newspapers asso

... Show More
View Publication Preview PDF
Crossref