Preferred Language
Articles
/
joe-440
Software Implementation of Binary BCH Decoder Using Microcontroller
...Show More Authors

In this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
The emission spectra and hydrodynamic properties of Al plasma using Nd-YAG laser
...Show More Authors

In this work, the emission spectra and atomic structure of the aluminum target had been studied theoretically using Cowan code. Cowan code was used to calculate the transitions of electrons between atomic configuration interactions using the mathematical method called (Hartree-Fock). The aluminum target can give a good emission spectrum in the XUV region at 10 nm with oscillator strength of 1.82.
The hydrodynamic properties of laser produced plasma (LPP) were investigated for the purpose of creating a light source working in the EUV region. Such a light source is very important for lithography (semiconductor manufacturing). The improved MEDUSA (Med103) code can calculate the plasma hydrodynamic properties (velocity, electron density,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Capacitated Vehicle Routing Problem (CVRP) Using Tabu Search Algorithm (TSA)
...Show More Authors

This paper investigates the capacitated vehicle routing problem (CVRP) as it is one of the numerous issues that have no impeccable solutions yet. Numerous scientists in the recent couple of decades have set up various explores and utilized numerous strategies with various methods to deal with it. However, for all researches, finding the least cost is exceptionally complicated. In any case, they have figured out how to think of rough solutions that vary in efficiencies relying upon the search space. Furthermore, tabu search (TS) is utilized to resolve this issue as it is fit for solving numerous complicated issues. The algorithm has been adjusted to resolve the exploration issue, where its methodology is not quite the same as the normal a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Dewatering of Kerosene using Hydrocyclone
...Show More Authors

Water/oil emulsion is considered as the most refractory mixture to separate because of the interference of the two immiscible liquids, water and oil. This research presents a study of dewatering of water / kerosene emulsion using hydrocyclone. The effects of factors such as: feed flow rate (3, 5, 7, 9, and 11 L/min), inlet water concentration of the emulsion (5%, 7.5%, 10%, 12.5%, and 15% by volume), and split ratio (0.1, 0.3, 0.5, 0.7, and 0.9) on the separation efficiency and pressure drop were studied. Dimensional analysis using Pi theorem was applied for the first time to model the hydrocyclone based on the experimental data. It was shown that the maximum separation efficiency; at split ratio 0.1, was 94.3% at 10% co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Automatic Determination of Liquid's Interface in Crude Oil Tank using Capacitive Sensing Techniques
...Show More Authors

The petroleum sector has a significant influence on the development of multiphase detection sensor techniques; to separate the crude oil from water, the crude oil tank is used. In this paper, a measuring system using a simple and low cost two parallel plate capacitance sensor is designed and implemented based on a Micro controlled embedded system plus PC to automatically identify the (gas/oil) and (oil/water) dynamic multi-interface in the crude oil tank. The Permittivity differences of two-phase liquids are used to determine the interface of them by measuring the relative changes of the sensor’s capacitance when passes through the liquid’s interface. The experiment results to determine the liquid’s interface is sa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Parallel Quick Search Algorithm for the Exact String Matching Problem Using OpenMP
...Show More Authors

String matching is seen as one of the essential problems in computer science. A variety of computer applications provide the string matching service for their end users. The remarkable boost in the number of data that is created and kept by modern computational devices influences researchers to obtain even more powerful methods for coping with this problem. In this research, the Quick Search string matching algorithm are adopted to be implemented under the multi-core environment using OpenMP directive which can be employed to reduce the overall execution time of the program. English text, Proteins and DNA data types are utilized to examine the effect of parallelization and implementation of Quick Search string matching algorithm on multi-co

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref