Preferred Language
Articles
/
joe-1286
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered  using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB  R  2011a  and system generator ISE14.1/SIMULINK.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
A model for incorporating suitable methods of usability evaluation into agile software development
...Show More Authors

The challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Processing and re-interpretation of gravity bouguer map of a selected area in the W-NW of Iraq
...Show More Authors
Abstract<p>Geophysical data interpretation is crucial in characterizing the subsurface structure. The Bouguer gravity map analysis of the W-NW region of Iraq serves as the basis for the current geophysical research. The Bouguer gravity data were processed using the Power Spectrum Analysis method. Four depth slices have been acquired after the PSA process, which are: 390 m, 1300 m, 3040 m, and 12600 m depth. The gravity anomaly depth maps show that shallow-depth anomalies are mainly related to the sedimentary cover layers and structures, while the gravity anomaly of the deeper depth slice of 12600 m is more presented to the basement rocks and mantle uplift. The 2D modeling technique was used for </p> ... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Oct 01 2010
Journal Name
2010 Ieee Symposium On Industrial Electronics And Applications (isiea)
Distributed t-way test suite data generation using exhaustive search method with map and reduce framework
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
ADJUSTING OFF – CENTERING PROCESS FOR A BLOW MOLDED PLASTIC PRODUCT BY USE OF WINQSB SOFTWARE
...Show More Authors

In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Journal Of Positive School Psychology
Designing A Quality Costing System In Commercial Banks (Applied Research In The Investment Bank Of Iraq)
...Show More Authors

Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Iraqi Geological Journal
Designing Raw Mix for Manufacturing Portland Cement using Euphrates Formation Marl Instead of Clays
...Show More Authors

Portland Cement is manufactured by adding 3% gypsum to clinker which is produced by grinding, pulverizing, mixing, and then burning a raw mix of silica, and calcium carbonate. Limestone is the main source of carbonates, while clay collected from arable land is the main source of silica. The marl in the Euphrates Formation was studied as an alternative to arable lands. Nine boreholes drilled and penetrated the marl layer in selected locations at the Kufa cement quarry. Forty-one samples of marl from boreholes and four samples of limestone from the closed area were collected. The chemical content of the major oxides and the hardness of the marl layer was very encouraging as a raw material for Portland Cement as they are SiO2 (17.60),

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 03 2021
Journal Name
2021 4th International Conference On Advanced Communication Technologies And Networking (commnet)
Methodology for Predicting the Optimum Design of Radio-Electronic Devices
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Mar 27 2020
Journal Name
Solid State Technology
Seepage and Slope Stability Analysis for Hemrin Earth Dam in Iraq Using Geo-Studio Software
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Physics And Research
PROPERTIES OF JOVIAN RADIO BURSTS AT FREQUENCY 20.1 MHZ
...Show More Authors

In this paper, a study was made to determine the properties of Jovian radio bursts emitted at frequency 20.1MHZ. The data were provided from the Radio Jove archive for twelve years (2000-2012) for multi stations. The duration time for Long bursts (L) was (10-30) seconds and for Short bursts (S) was (10-20) seconds. The effect of radio bursts from the Sun and the galactic background were calculated at the same frequency and were found that radio bursts from the Sun will reduce the occurrence probability of Jovian radio bursts much more than radio bursts from the galactic background. The distribution of Jovian radio bursts was different; the occurrence probability with respect to the northern latitudes was more than the southern latitudes.