Preferred Language
Articles
/
pRfUXJIBVTCNdQwC162_
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for serial one-dimensional (1-D) CDMA and parallel (2-D) CDMA is made under Additive White Gaussian Noise (AWGN), flat fading and multi-path selective fading channels conditions. It is found that 2-D CDMA has better speed and performance than serial 1-D CDMA.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Integrated in the industrial design system: نوال محسن علي، مصطفى محمد بركات
...Show More Authors

Although the majority of trends confirm the design aspects of the performance, functional and aesthetic design of the product. However, the attention was more focused on the nature of the plastic for those results, it is through the appearance of formal and guaranteed career such as designing Achieved adopt us the extent of the impact Relations Association between the elements and principles of design to achieve complementarity in the completed design of aesthetic and functional significance expressive and symbolic and in doing so has introduced a lot of new concepts for the arrangement and organization, coordination and functional classification of the unfinished design gave way to show diversity trends in the design of industrial produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of Nonlinear PID Neural Controller for the Speed Control of a Permanent Magnet DC Motor Model based on Optimization Algorithm
...Show More Authors

In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Digital-Based Optimal AVR Design of Synchronous Generator Exciter Using LQR Technique
...Show More Authors

In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q,  this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Image & Video Processing
Enhancement of LBP-based face identification system by adopting preprocessing techniques
...Show More Authors

Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap

... Show More
View Publication
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Performance Evaluation of Pole Placement and Linear Quadratic Regulator Strategies Designed for Mass-Spring-Damper System Based on Simulated Annealing and Ant Colony Optimization
...Show More Authors

This paper investigates the performance evaluation of two state feedback controllers, Pole Placement (PP) and Linear Quadratic Regulator (LQR). The two controllers are designed for a Mass-Spring-Damper (MSD) system found in numerous applications to stabilize the MSD system performance and minimize the position tracking error of the system output. The state space model of the MSD system is first developed. Then, two meta-heuristic optimizations, Simulated Annealing (SA) optimization and Ant Colony (AC) optimization are utilized to optimize feedback gains matrix K of the PP and the weighting matrices Q and R of the LQR to make the MSD system reach stabilization and reduce the oscillation of the response. The Matlab softwar

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF