Preferred Language
Articles
/
joe-1286
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered  using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB  R  2011a  and system generator ISE14.1/SIMULINK.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 19 2020
Journal Name
Indonesian Journal Of Chemistry
Determination of Eugenol in Personal-Care Products by Dispersive Liquid-Liquid Microextraction Followed by Spectrophotometry Using <i>p</i>-Amino-<i>N,N</i>-dimethylaniline as a Derivatizing Agent
...Show More Authors

Two simple methods for the determination of eugenol were developed. The first depends on the oxidative coupling of eugenol with p-amino-N,N-dimethylaniline (PADA) in the presence of K3[Fe(CN)6]. A linear regression calibration plot for eugenol was constructed at 600 nm, within a concentration range of 0.25-2.50 μg.mL–1 and a correlation coefficient (r) value of 0.9988. The limits of detection (LOD) and quantitation (LOQ) were 0.086 and 0.284 μg.mL–1, respectively. The second method is based on the dispersive liquid-liquid microextraction of the derivatized oxidative coupling product of eugenol with PADA. Under the optimized extraction procedure, the extracted colored product was determined spectrophotometrically at 618 nm. A l

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
THE ETHICAL RESPONSIBILITY OF THE COMMUNICATOR IN PRESS INSTITUTIONS TO CONSOLIDATE THE VALUES OF TOLERANCE: A Study of the Communicator in the Newspapers (Al-Zaman, Al-Sabah, Al-Mada) For the period: 1/5/2020 to 1/10/2020
...Show More Authors

This research deals with the role that the media can play in spreading awareness, culture and sound behavior among members of society, due to its ability to reach the largest number of individuals; its wide spread within society; and the moral responsibility of the media in consolidating the components of civil peace. The media works on forming intellectual convictions and behavioral attitudes by publishing opinions and ideas, introducing them to people's awareness and enhancing them in the practice of their daily lives, he was its media medium. Sociologists and psychologists confirm that the media. The significance of the research comes due to the broadening of violence and sectarian fighting; the absence of a culture of civil social pe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
I-manager’s Journal On Communication Engineering And Systems
SOLVING NETWORK CONGESTION PROBLEM BY QUALITY OF SERVICE ANALYSIS USING OPNET
...Show More Authors

Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r

... Show More
Publication Date
Sun May 01 2016
Journal Name
International Journal Of Computer Applications
Lossless Image Compression using Adaptive Predictive Coding of Selected Seed Values
...Show More Authors

Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Using Backpropagation to Predict Drought Factor in Keetch-Byram Drought Index
...Show More Authors

Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Estimation of return stock rate by using wavelet and kernel smoothers
...Show More Authors

This article aim to estimate the Return Stock Rate of the private banking sector, with two banks, by adopting a Partial Linear Model based on the Arbitrage Pricing Model (APT) theory, using Wavelet and Kernel Smoothers. The results have proved that the wavelet method is the best. Also, the results of the market portfolio impact and inflation rate have proved an adversely effectiveness on the rate of return, and direct impact of the money supply.

Scopus (3)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Surgery
Evaluation of using double Teostrut graft to control naral tip projection
...Show More Authors

Abstract Background: Dne of the key component of nasal tipplasty is effecter control of naral tip projection. Several cartilage grafts have been decreased for this purpose each had its own advantage and disadvantage. Aim: To evaluate using of double teostrut graft for controlling of tip projection. Patients and Methods: A total number of 170 patients were subjected to primary and secondary rhino plaster between January 2020 to January 2023. Those patients had double Teostrut banner graft for support of their nasal tip and maintaining tip projection after operation. Results: The follow period was ranging between 6-12 months. The shape of the nose was evaluating by patents vernal analogues scale. The average score for patients satisfaction wa

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Approximated Methods for Linear Delay Differential Equations Using Weighted Residual Methods
...Show More Authors

The main work of this paper is devoted to a new technique of constructing approximated solutions for linear delay differential equations using the basis functions power series functions with the aid of Weighted residual methods (collocations method, Galerkin’s method and least square method).

View Publication Preview PDF
Crossref