Preferred Language
Articles
/
alkej-28
Performance of Turbo-Codes with Some Proposed Interleaver Schemes
...Show More Authors

This paper describes a number of new interleaving strategies based on the golden section. The new interleavers are called golden relative prime interleavers, golden interleavers, and dithered golden interleavers. The latter two approaches involve sorting a real-valued vector derived from the golden section. Random and so-called “spread” interleavers are also considered. Turbo-code performance results are presented and compared for the various interleaving strategies. Of the interleavers considered, the dithered golden interleaver typically provides the best performance, especially for low code rates and large block sizes. The golden relative prime interleaver is shown to work surprisingly well for high puncture rates. These interleavers have excellent spreading properties in general and are thus useful for many applications other than Turbo-codes.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Some Results on Normalized Duality Mappings and Approximating Fixed Points in Convex Real Modular Spaces
...Show More Authors

  In this paper, the concept of normalized duality mapping has introduced in real convex modular spaces. Then, some of its properties have shown which allow dealing with results related to the concept of uniformly smooth convex real modular spaces. For multivalued mappings defined on these spaces, the convergence of a two-step type iterative sequence to a fixed point is proved

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Feb 11 2026
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Corrosion Behavior of Nanocomposite Al-9 wt% Si Alloy Reinforced with Carbon Nanotubes
...Show More Authors

An effort is made to study the effect of composite nanocoating using aluminum-9%wt silicon alloys reinforced with different percentage (0.5,1,2,4)wt.% of carbon nanotubes (CNTs) using  plasma spraying. The effect of this composite on corrosion behavior for AA6061-T6 by extrapolation Tafel test in sea water 3.5wt% NaCl was invested. Many specimens where prepared from AA6061-T6 by the dimension (15x15x3)mm as this first set up and other steps include coating process, X-ray diffraction and SEM examination .The results show the CNTs increase the corrosion rate of the nanocomposite coatings with increasing the weight percentage of CNTs within the Al-Si matrix. Al-9wt%Si coating layer itself has less corrosion rate if compared with both n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Problems lead to the low level of academic achievement in the evening school: suggestions and solutions
...Show More Authors

Academic achievement is a professional standard for measuring student levels in the first stages. Therefore, any indication of the level of achievement makes us in an attempt to employ students in evening schools. The researcher has developed a closed questionnaire of (36) paragraphs. A total of (164) male and (24) female students were chosen from evening schools. The result of this research revealed that the number of students was a reason for the low level of their achievement, the lack of laboratories, educational methods, and techniques of the most prominent problems confirmed by students in these schools. In addition, to support educational institutions with their necessary needs. The most important conclusion in this research is th

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STUDY THE CONTAMINATION OF WATER BOTTLES WITH SOME CHEMICALS DUE TO HEAT EXPOSURE: STUDY THE CONTAMINATION OF WATER BOTTLES WITH SOME CHEMICALS DUE TO HEAT EXPOSURE
...Show More Authors

The transfer of chemical pollutants from bottled water into water due to heat, sunlight and poor storage is one of the most serious threats to human health around the world, the objective of this study was to estimate the pH value and the transport of heavy metals from plastic bottles to water, for this purpose, 30 bottles of water for 10 local brands were collected and divided into three groups, the first was left at room temperature 25°C, The second was placed in a heat oven at 25°C and the third in another oven at 50°C for two weeks. The results showed significant differences at (P<0.05) between water samples, pH value and concentrations of heavy metals (Sb, Pb, Ni, Cu, Cr, Cd and Fe) we

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
A Prototype and Roadmap for Transition to IPv6 with Performance Evaluation
...Show More Authors

The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Baghdad Science Journal
Densenet Model for Binary Glaucoma Classification Performance Assessment with Texture Feature
...Show More Authors

تعتبر شبكية العين جزءًا مهمًا من العين لأن الأطباء يستخدمون صورها لتشخيص العديد من أمراض العيون مثل الجلوكوما واعتلال الشبكية السكري وإعتام عدسة العين. في الواقع، يعد تصوير الشبكية المجزأ أداة قوية للكشف عن النمو غير العادي في منطقة العين بالإضافة إلى تحديد حجم وبنية القرص البصري. يمكن أن يؤدي الجلوكوما إلى إتلاف القرص البصري، مما يغير مظهر القرص البصري للعين. تعمل تقنيتنا على الكشف عن الجلوكوما وتصنيفه

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 19 2022
Journal Name
Intelligent Service Robotics
Dynamic performance of a series elastic actuator with variable stiffness logarithmic spiral spring
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref