Preferred Language
Articles
/
thYXvooBVTCNdQwCeqTh
Robot Human Interface for Housekeeper Robot with Wireless Capabilities
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Frequency of Salivary Human Cytomegalovirus in Iraqi Patients with Chronic Periodontitis
...Show More Authors

Background: Periodontitis is a chronic inflammatory disease which is initiated by an infection of the oral microorganisms and it involves the humoral and cellular characteristics of the host response. The periodontal disease is found to develop due to a series of interactions among the periodontotrophic herpes viruses, the periodontopathic bacteria and the host immune reactions.Recent studies have demonstrated that various human viruses, especially human cytomegalovirus seems to play a part in the pathogenesis of periodontitis. Periodontitis is an infectious disease involving specific bacteria and viruses.
Objectives: The present study was initiated to evaluate the percentage of human cytomegalovirus in periodontitis patients and dete

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Human Leukocyte Antigens Assosiation with Systemic Lupus Arythematosus In Iraqi Patients
...Show More Authors

Background: The etiology of Systemic lupus erythematosus seems to be multifactorial including environmental as well as genetic factors. The genetic predisposition was supported by the occurrence of Systemic lupus erythematosus in more than one member of a family as well as in identical twins.
Aim of the study: To determine the human leukocyte antigen typing class I (A and B) in patients with Systemic Lupus Erythematousus disease.
Methods: Patients group consisted of 44 Iraqi Arab Muslims patients with Systemic lupus erythematosus disease who presented to Baghdad Medical City from January 2010 to January 2012 from Baghdad Province. The second control group consisted from 80 Iraqi Arab Muslims volunteers from hospital employees and t

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Hair Is An Indicator Oe Human Pollutants With The Toxic Substances
...Show More Authors

Hair is an excellent indicator for abnormal concentration of toxic elements , In this study a random samples from girls hair of 12 cm long were irradiated by a flux of neutrons (4x10^ n/ cm^.s) obtained from an Am-Be neutron source of 5-Ci activitity . The y-ray activity measurements were carried out by using a " 5x5 " well- type Nal (Tl) detector. The study indicates clearly that the maximum concentration of elements was at about 7 cm hair length.

View Publication Preview PDF
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Automatic Determination of Liquid's Interface in Crude Oil Tank using Capacitive Sensing Techniques
...Show More Authors

The petroleum sector has a significant influence on the development of multiphase detection sensor techniques; to separate the crude oil from water, the crude oil tank is used. In this paper, a measuring system using a simple and low cost two parallel plate capacitance sensor is designed and implemented based on a Micro controlled embedded system plus PC to automatically identify the (gas/oil) and (oil/water) dynamic multi-interface in the crude oil tank. The Permittivity differences of two-phase liquids are used to determine the interface of them by measuring the relative changes of the sensor’s capacitance when passes through the liquid’s interface. The experiment results to determine the liquid’s interface is sa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 13 2021
Journal Name
Journal Of Lasers In Medical Sciences
Effects of Different Laser Treatments on Some Properties of the Zirconia-Porcelain Interface
...Show More Authors

Introduction: This study was performed to compare the effect of Fractional CO2 laser or Q switched Nd:YAG laser of surface treatment on the shear bond strength of zirconia-porcelain interface. Methods: Fractional CO2 laser at 30 W, 2 ms, time interval 1 ms, distance between spots 0.3 mm, and number of scans is (4) or Q switched Nd:YAG laser at 30 J/mm2 and 10 Hz were used to assess the shear bond strength of zirconia to porcelain. Pre-sintered zirconia specimens were divided into three groups (n = 10) according to the surface treatment technique used: (a) untreated (Control) group; (b) CO2 group; (c) Nd:YAG group. All samples were then sintered and veneered with porcelain according to the manufacturer’s instructions. Surface morph

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Channel Estimation and Prediction Based Adaptive Wireless Communication Systems
...Show More Authors

Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath  propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.

In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref