Preferred Language
Articles
/
joe-1286
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered  using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB  R  2011a  and system generator ISE14.1/SIMULINK.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Materials Science And Engineering
Crossref (29)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Iraqi Journal Of Physics
Photometry Technique to Map Elements’ Distribution on Comets’ Nuclei Surfaces Using a New Method

This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Dec 24 2021
Journal Name
Iraqi Journal Of Science
A Model of Sky Temperature Estimation at 1.42 GHz using University of Baghdad’s Radio Telescope

 The objective of this study is to select a suitable observing region at Baghdad location (44o 22' 48", 33o 16' 30") with low interference that may affect frequency of 1.42 GHz. Baghdad University Radio Telescope (BURT) is used in this study to determine a convenient region for observation in Baghdad sky. Different azimuths and elevations were chosen at different observations time. The results of this study showed that the best observations regions were located at azimuth (120o-160o) and (210o-260o). These regions included less sky temperature and estimated to be (42.8 to 163) K. The sky temperature model could be represente

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Tue Oct 26 2021
Journal Name
Series On Biomechanics
Scopus (2)
Scopus
View Publication
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A lightweight AES Algorithm Implementation for Secure IoT Environment

In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the d

... Show More
Scopus (17)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Engineering
Software Implementation of Binary BCH Decoder Using Microcontroller

In this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.

 

 

View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Chaos-based Color Image Steganography Method Using 3 D Cat Map

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Secure Marketing Website

The  Internet  provides business  with  new methods of reaching  and interacting with ·customers as  well as  improving inter  and  intra  business communication.

In  this  research, a  soft.ware  marketing web  site  with  a security

tools   is  designed  and   implemented  to  protect   the  customer  pers.onal information  and   payment   information  when  a  customer   tries  to  pay  a software package.

A  new   protectior.t method   is suggested  to  protect &nbsp

... Show More
View Publication Preview PDF