Preferred Language
Articles
/
5hdpUpEBVTCNdQwCl5Tj
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (AWGN) and channels disturbed by Rayleigh fading. Both the inherently wideband DCSK modulation and the space-time block code (STBC) are techniques that …

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Materials Research Bulletin
Understanding the impacts of Al+3-substitutions on the enhancement of magnetic, dielectric and electrical behaviors of ceramic processed nickel-zinc mixed ferrites: FTIR assisted studies
...Show More Authors

View Publication
Scopus (26)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Oct 19 2025
Journal Name
Sciences Journal Of Physical Education
Cognitive bias and its relationship to the performance of the two skills of standing on (hands and the human wheel) on the floor movement carpet device in the artistic gymnastics for women
...Show More Authors

View Publication
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Assessment of Water Clarity within Dokan Lake Using Remote Sensing Techniques
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Drilling Optimization by Using Advanced Drilling Techniques in Buzurgan Oil Field
...Show More Authors

Efficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pres

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Oct 19 2025
Journal Name
Al–bahith Al–a'alami
Organizational reputation: A descriptive study of concept development and measurement techniques
...Show More Authors

The study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.

    The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:

     Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of 2 different techniques in second stage implant surgery
...Show More Authors

Background: Dental implant is one of the most important options for teeth replacement. In two stage implant surgery, a few options could be used for uncovering implants, scalpel and laser are both considered as effective methods for this purpose. The Aim of the study: To compare soft tissue laser and scalpel for exposing implant in 2nd stage surgery in terms of the need for anesthesia, duration of procedure and pain level assessment at day 1 and day 7 post operatively using visual analogue scale . Materials and methods: Ten patients who received bilateral implants participated after healing period completed, gingival depth over each implant was recorded and then implant(s) were exposed by either scalpel or laser with determination for th

... Show More
View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Monitoring of south Iraq marshes using classification and change detection techniques
...Show More Authors

Digital change detection is the process that helps in determining the changes associated with land use and land cover properties with reference to geo-registered multi temporal remote sensing data. In this research change detection techniques have been employed to detect the changes in marshes in south of Iraq for two period the first one from 1973 to 1984 and the other from 1973 to 2014 three satellite images had been captured by land sat in different period. Preprocessing such as geo-registered, rectification and mosaic process have been done to prepare the satellite images for monitoring process. supervised classification techniques such maximum likelihood classification has been used to classify the studied area, change detection aft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Oct 19 2025
Journal Name
Al–bahith Al–a'alami
Qualitative Curricula in Social Sciences: A Crisis of Philosophy or Techniques
...Show More Authors

The general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as sol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Alexandria Engineering Journal
A review of free piston engine control literature—Taxonomy and techniques
...Show More Authors

View Publication Preview PDF
Scopus (33)
Crossref (33)
Scopus Clarivate Crossref