Preferred Language
Articles
/
joe-1286
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered  using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB  R  2011a  and system generator ISE14.1/SIMULINK.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 01 2025
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 17, Nº. 5, 2022, Págs. 269-271
The effect of a suggested rehabilitation curriculum in the treatment of partial rupture of the gluteal muscles and strengthening the working muscles of the pelvic joint in football players
...Show More Authors

Autorías: Imad Kadhim Khlaif, Israa Gameel Hussein, Talib Faissal Shnawa. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.

View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
The significance of the saying of Al-Hafiz Ibn Hajar (has a vision) and the impact of this on the hadith, an applied study through the approximation of Refinement.
...Show More Authors

Summary:

This research revolves around the probing of those whom Ibn Hajar said, "He has a vision", its significance, and the ruling on the connection and transmission to it.  The number of narrators reached fifty-one (51) narrators, among whom it was said, “He has a vision, whether it is definite or possibly. Some of them had a vision and companionship.”They are eleven (11) narrators, And among them were those who had visions and had no company, and their number was twenty-one (21) narrators, and among them were those who had no vision and nor company, and their number is nineteen (19) narrators.
As a result , whoever said about him “has a vision” and has companions, his hadith is connected, even i

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2017
Journal Name
Asian Journal Of Biological And Life Sciences
Bioethanol Production from Banana Peels using Different Pretreatments
...Show More Authors

Publication Date
Mon Dec 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mass Transfer Enhancement Using Extensions as Turbulence Promoters
...Show More Authors

Mass transfer was studied using a rotating cylinder electrode with different lengths of legs acting as turbulence promoters. Two types of rotating cylinder ,made of brass, were examined : an enhanced cylinder one, with four rectangular extensions 10 mm long, 10 mm wide, and 1mm thick, and an enhanced cylinder two with four longitudes 30 mm long,10 mm wide, and 1mm thick. The best performance was obtained for enhanced cylinder two at low rotation speeds while enhanced cylinder one was realized at high rotation speeds. The mass transfer enhancement as compared with a normal rotating cylinder electrode, devoid of promoters, is 53% or 58% higher. The enhancement percentage decreased as rotation speeds increased further, since, seemingly, ful

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
Removal of Oil From Wastewater Using Walnut-Shell
...Show More Authors

 

The ability of pulverized walnut-shell to remove oil from aqueous solutions has been studied. It involves two-phase process which consists of using walnut-shell as a filtering bed for the accumulation and adsorption of oil onto its surface. Up to 96% oil removal from synthetic wastewater samples was achieved while tests results showed that 75% of oil can be removed from the actual wastewater discharged from Al- Duara refinery in the south of Baghdad.

 

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Digital Color Image Watermarking Using Encoded Frequent Mark
...Show More Authors

With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.

This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Using Alternative Cogeneration Plants in Iraqi Petroleum Industry
...Show More Authors

The present paper describes and analyses three proposed cogeneration plants include back pressure steam-turbine system, gas turbine system, diesel-engine system, and the present Dura refinery plant. Selected actual operating data are employed for analysis. The same amount of electrical and thermal product outputs is considered for all systems to facilitate comparisons. The theoretical analysis was done according to 1st and 2nd law of thermodynamic. The results demonstrate that exergy analysis is a useful tool in performance analysis of cogeneration systems and permits meaningful comparisons of different cogeneration systems based on their merits, also the result showed that the back pressure steam-turbine is more efficient than other pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Face-based Gender Classification Using Deep Learning Model
...Show More Authors

Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Urinary Tract Lithotripsy Using Holmium: YAG (2100nm) Laser
...Show More Authors

Background: Laser urinary stone lithotripsy is an established endourological modality. Ho:YAG(2100nm) laser have broadened  the indications for ureteroscopic stone managements  to include larger stone sizes throughout the whole urinary tract.

Purpose: To evaluate the effectiveness and safety of Holmium: YAG(2100nm) laser lithotripsy with a semirigid uretero scope for urinary stone calculi in a prospective cohort of 17 patients.

Patients and Methods: Holmium: YAG(2100nm) laser lithotripsy was performed with a semirigid ureteroscope in 17 patients from September 2016 to December  2016. Calculi were located in the lower ureter in 9 patients (52.9%), the midure

... Show More
View Publication Preview PDF