Preferred Language
Articles
/
yRZAjIcBVTCNdQwCxlXn
Ultra Wideband Cognitive Network Objective Issues
...Show More Authors

Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and proved that the bit error rate for this detection scheme can be considered acceptable.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Apr 18 2025
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 20 1930
Journal Name
College Of Islamic Sciences
The causes of defeat and weakness and humiliation as described by Al - Imran: Objective study
...Show More Authors

Praise be to Allah. Praise be to Him. We seek refuge in Him. We seek forgiveness from him. We seek forgiveness from him.
And the disadvantages of our actions, of his hands
e
It is important, if not all, to pay tribute to God
Muhammad Abdo and Rasoulou, there is no way to deprive the nation of the weakness of God alone and not to share it
 Which suffer from the Quran, and the loss of its borders, bad
The work did not work and did not improve
Do what they offer and delay the others, except by reference to this Koran and the extraction of treasures and secrets
 And news.
The Great Quran Study

Lu Imito ordered each poisoned, and achieved several targets of
YEMYA: Knowing the secrets of the Grea

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Soft Computing
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks
...Show More Authors

Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Parallel Routing in Wireless Sensor Network
...Show More Authors

The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref