Preferred Language
Articles
/
mRfEXJIBVTCNdQwCQ61g
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels parameters values including multi-path gains vector, multi-path delay time vector, and maximum Doppler shift. © 2009 Springer Science+Business Media, LLC.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Parallel Clustering Analysis Based on Hadoop Multi-Node and Apache Mahout
...Show More Authors

     The conventional procedures of clustering algorithms are incapable of overcoming the difficulty of managing and analyzing the rapid growth of generated data from different sources. Using the concept of parallel clustering is one of the robust solutions to this problem. Apache Hadoop architecture is one of the assortment ecosystems that provide the capability to store and process the data in a distributed and parallel fashion. In this paper, a parallel model is designed to process the k-means clustering algorithm in the Apache Hadoop ecosystem by connecting three nodes, one is for server (name) nodes and the other two are for clients (data) nodes. The aim is to speed up the time of managing the massive sc

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2013
Journal Name
Journal Of Kufa For Mathematics And Computer
Some Properties Of N-Co probabilistic Normed Space And Co-probabilistic Dual Space Of N-Co probabilistic Normed Space
...Show More Authors

The primary purpose of this paper is to introduce the, N-coprobabilistic normed space, coprobabilistic dual space of N-coprobabilistic normed space and give some facts that are related of them.

View Publication
Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Chinese Chemical Letters
Extraction of cobalt(II) from aqueous solution by N,N′-carbonyl difatty amides
...Show More Authors

The development of economic and environmentally friendly extractants to recover cobalt metal is required due to the increasing demand for this metal. In this study, solvent extraction of Co(II) from aqueous solution using a mixture of N,N0-carbonyl difatty amides (CDFAs) synthesised from palm oil as the extractant was carried out. The effects of various parameters such as acid, contact time, extractant concentration, metal ion concentration and stripping agent and the separation of Co(II) from other metal ions such as Fe(II), Ni(II), Zn(III) and Cd(II) were investigated. It was found that the extraction of Co(II) into the organic phase involved the formation of 1:1 complexes. Co(II) was successfully separated from commonly associated metal

... Show More
View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Thermodynamic function of valineacid in n-n dimethyl formamide mixtures from conductance measurement
...Show More Authors

Some physical properties enthalpy (?H), entropy (?s), free energy (?G),capacities(?cp?) and Pka values) for valine in dimethyl foramideover the temperature range 293.15-318.15K, were determined by direct conductance measurements. The acid dissociation at six temperature was examined at solvent composition x2) involving 0.141 of dimethyl foramide . As results, calculated values have been used to determine the dissociation constant and the associated thermodynamic function for the valine in the solvent mixture over temperatures in the range 293.15-318.15 k. The Pka1, and Pka2 were increased with increasing temperature.

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
European Chemical Bulletin
Thermodynamic function of valineacid in n-n dimethyl formamide mixtures from conductance measurement
...Show More Authors

sanaa tareq, Baghdad Science Journal, - Cited by 1

View Publication
Publication Date
Thu Oct 18 2018
Journal Name
Lambert Academic Publishing
Mathematical Models For Contamination Soil
...Show More Authors

ENGLISH

Publication Date
Wed Mar 15 2023
Journal Name
Al-adab Journal
Models of Phonological Loanword Adaptation
...Show More Authors

Borrowing in linguistics refers to the process whereby a group of speakers incorporates certain foreign linguistic components into their home language via a process known as linguistic borrowing. The process by which these foreign linguistic elements, known as loanwords, go through phonological, morphological, or semantic changes in order for them to fit the grammar of the recipient language is referred to as loanword adaptation. Loanwords go through these changes in order for them to become compatible with the grammar of the recipient language. One of the most divisive topics in loanword phonology is whether adaptations occur at the phonemic or phonetic levels, and current literature distinguishes three primary viewpoints: nativiza

... Show More
View Publication
Crossref