Preferred Language
Articles
/
joe-220
Encoding of QC-LDPC Codes of Rank Deficient Parity Matrix
...Show More Authors

The encoding of long low density parity check (LDPC) codes presents a challenge compared to its decoding. The Quasi Cyclic (QC) LDPC codes offer the advantage for reducing the complexity for both encoding and decoding due to its QC structure. Most QC-LDPC codes have rank deficient parity matrix and this introduces extra complexity over the codes with full rank parity matrix. In this paper an encoding scheme of QC-LDPC codes is presented that is suitable for codes with full rank parity matrix and rank deficient parity matrx. The extra effort required by the codes with rank deficient parity matrix over the codes of full rank parity matrix is investigated.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Audio compression using transforms and high order entropy encoding
...Show More Authors

<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low &amp; multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 21 2022
Journal Name
Journal Of Planner And Development
Enviromental impact assessment of cement industry using Leopold Matrix
...Show More Authors

The assessment of the environmental impact of the cement industry using the Leopold Matrix is ​​to determine the negative and positive impacts on the environment resulting from this industry, and what are the long-term and short-term effects, direct and indirect, and the amount of these effects and potential risks, and that this evaluation process is done through a number of methods, including Matrix method, including (Leopold).

 

The importance of the research because the cement occupies is of great importance in the world, especially in our country, Iraq, in the sector of construction and modernity, and the toxic emissions and solid waste produced by the production of this material. <

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (3)
Scopus
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Controlled Release Floating Matrix Tablet of Captopril
...Show More Authors

The present study was done to prepare a gastroretentive floating tablet of captopril (CAP) which is an angiotensin converting enzyme inhibitor (ACE-inhibitor) used in the treatment of hypertension and heart failure. CAP is mainly absorbed from the proximal intestine and to a lesser extent from the stomach, also CAP stability decreases as the pH raised above 1.2 and this makes it a suitable candidate for floating dosage form.Effervescent floating tablets of CAP were prepared in order to prolong the gastric residence time and increase the bioavailability of the drug. The floating tablets of CAP were prepared by direct compression and wet granulation technique, using the polymer hydroxypropylmethylcellulose (HPMC) as the primary retarding p

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri Dec 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Analysis for Hybrid Massive MIMO FSO/RF Links Based on Efficient Channel Codes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Buckling Analysis of Unidirectional Polymer Matrix Composite Plates
...Show More Authors

This study deals with the estimation of critical load of unidirectional polymer matrix composite plates by using experimental and finite element techniques at different fiber angles and fiber volume fraction of the composite plate.

            Buckling analysis illustrated that the critical load decreases in nonlinear relationship with the increase of the fiber angle and that it increases with the increase of the fiber volume fraction.

            The results show that the maximum value of the critical load is (629.54 N/m) at (q = 0°) and (Vf = 40 %) for the finite element method, while the minimum val

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 27 2024
Journal Name
Diagnostics
Accuracy of Gingival Crevicular Fluid Biomarkers of MMP8, TIMP1, RANK, RANKL, and OPG in Differentiating Symptomatic and Asymptomatic Apical Periodontitis
...Show More Authors

Apical periodontitis (AP) is the most prevalent chronic inflammatory disease of the teeth. Bone resorption dynamics in symptomatic and asymptomatic AP are still unrecognized. This study examined different inflammatory markers within gingival crevicular fluid, including matrix metalloproteinases 8 (MMP8), tissue inhibitors of metalloproteinases 1 (TIMP1), receptor activator of nuclear factor κB (RANK), its ligand (RANKL), and osteoprotegerin (OPG), to be used in comparing symptomatic apical periodontitis (SAP) and asymptomatic apical periodontitis (AAP) versus healthy teeth. Subjects with SAP, AAP, and a control group were recruited and GCF samples were collected by Periopaper strips. Clinical and radiographical measures were used f

... Show More
View Publication
Scopus Clarivate Crossref