Preferred Language
Articles
/
joe-693
Simple 2D chaotic remapping scheme for securing optical communication networks
...Show More Authors

In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the  BER of an unauthorized receiver reaches 0.5.  Furthermore, the peak-to-average-power-ratio (PAPR) of the transmitted OFDM signal can be decreased by about 0.8 dB at BER equal to 10^-4.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Telkomnika
Proposed different relay selection schemes for improving the performance of cooperative wireless networks
...Show More Authors

Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computer Modeling In Engineering & Sciences
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Sep 08 2025
Journal Name
Al-adab Journal
Investigating Classroom Verbal and Nonverbal Communication
...Show More Authors

The present study aims at investigating classroom verbal and nonverbal communication at the departments of English language . An observation checklist has been constructed , which is distributed into several domains that include a number of items to investigate classroom communication . Face validity and reliability coefficient have been computed. The checklist has been applied on 86 instructors at the Colleges of Education and Arts, Departments of English Language at the Universities of ThiQar, Basrah ,and Maysan . One sample t- test and Two independent sample t-test formulas have been used. Final results reveal that college instructors use verbal communication inside their classrooms and non- verbal communication has not been employed by

... Show More
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
2018 International Conference On Computer And Applications (icca)
Evolutionary Perspective of Mobile Communication Technologies
...Show More Authors

Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
2018 International Conference On Computer And Applications (icca)
Evolutionary Perspective of Mobile Communication Technologies
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Numerical scheme to Solve Boundary Value Problems Involving Singular Perturbation
...Show More Authors

The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Document retrieval using term term frequency inverse sentence frequency weighting scheme
...Show More Authors

The need for an efficient method to find the furthermost appropriate document corresponding to a particular search query has become crucial due to the exponential development in the number of papers that are now readily available to us on the web. The vector space model (VSM) a perfect model used in “information retrieval”, represents these words as a vector in space and gives them weights via a popular weighting method known as term frequency inverse document frequency (TF-IDF). In this research, work has been proposed to retrieve the most relevant document focused on representing documents and queries as vectors comprising average term term frequency inverse sentence frequency (TF-ISF) weights instead of representing them as v

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref