Preferred Language
Articles
/
6RdqUpEBVTCNdQwCZ5Te
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Microprocessors And Microsystems
Design considerations for a microprocessor-based Doppler radar
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
University Of Plymouth
Intrinsic Control Strategies for Herpesvirus-based Vaccine Vectors
...Show More Authors

Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Fractional Free Volume Dependence of Neutron-Irradiated Polystyrene (PS) Measured by Positron Method
...Show More Authors

The fractional free volume (Fh) in polystyrene (PS) as a function of neutron -irradiation dose has been measured, using positron annihilation lifetime (PAL) method. The results show that Fh values decreased with increasing n-irradiation dose up to a total dose of 501.03× 10-2 Gy.
A percentage reduction of 2.14 in Fh values is noticed after the initial n-dose corresponding to a percentage reduction in the free volume equal to 42.14/Gy.
The total n-dose induces a percentage reduction of 7.26, corresponding to a percentage reduction of 1.45/Gy. These results indicate that cross -linking is the predominant process induced by n-irradiation.
The results suggest that n-irradiation induces structure changes in PS, causing cross-linking

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
International Communications In Heat And Mass Transfer
Determination of a time-dependent thermal diffusivity and free boundary in heat conduction
...Show More Authors

View Publication
Scopus (18)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Unsteady Magnetohydrodynamics oscillating flow of third order fluid with central free stream velocity
...Show More Authors

In this article the unsteady magnetohydrodynamics oscillating flow of third order fluid with free stream velocity is proposed. It is found that the motion equation is controlled by five dimensionless parameters namely the coecostic parameter 4, viscoelostic parameter ?,acceleration/deceleration c,suction/blowing d and material constants ? . The effect of each of these parameters upon the velocity distribution is analysised

View Publication Preview PDF
Crossref
Publication Date
Tue May 21 2019
Journal Name
The Journal Of Engineering
Performance of a tubular machine driven by an external‐combustion free‐piston engine
...Show More Authors

Crossref (2)
Clarivate Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 31 2020
Journal Name
International Journal Of Heat And Technology
Enhancement of Natural Convection Heat Transfer of Hybrid Design Heat Sink
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
International Journal Of Computer Science And Mobile Computing
Hierarchical Fixed Prediction of Mixed based for Medical Image Compression.
...Show More Authors

Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Arduino-Based Controller for Sequence Development of Automated Manufacturing System
...Show More Authors

It has become necessary to change from a traditional system to an automated system in production processes, because it has high advantages. The most important of them is improving and increasing production. But there is still a need to improve and develop the work of these systems. The objective of this work is to study time reduction by combining multiple sequences of operations into one process. To carry out this work, the pneumatic system is designed to decrease\ increase the time of the sequence that performs a pick and place process through optimizing the sequences based on the obstacle dimensions. Three axes are represented using pneumatic cylinders that move according to the sequence used. The system is implemented and

... Show More
Preview PDF
Crossref (5)
Crossref