Preferred Language
Articles
/
joe-1286
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered  using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB  R  2011a  and system generator ISE14.1/SIMULINK.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Thermal Behaviour of Paraffin Wax/Poly Vinyl Alcohol Composite Material
...Show More Authors

Polymer additives binder system provides many properties useful in thermal energy storage (TES) then developed the efficient energy storage materials and green strength bodies system.

This paper studies the thermal energy storage property for polyvinyl alcohol (PVOH) / paraffin wax (WPw) blends. To enhance paraffin wax thermal conductivity, PVOH as a material which high conductivity was employed. A fixed weight of Paraffin wax was dispersed with PVOH heterogeneously at different additive weights ratios of PVOH/Pw (50/50, 67/33, 75/25, and 80/20) wt. ratio respectively. The composite material was prepared using wetted pressing method.

Both base materials (polyvinyl alcohol and paraffin wax) were scanned using differential

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Stand-Alone PV Generator Comparing with Conventional Systems for Electrification of Small Social Centres in Remote Area
...Show More Authors

Many isolated rural communities are located in regions where there is an abundant and reliable supply of solar energy, but where the distance to the nearest power station is many tens or even hundreds of kilometre. It is therefore mainly in these areas that rural electrification is now being provided by PV generators. since Stand-Alone PV generator can offer the most cost-effective and reliable option for providing power needed in remote places. Accordingly these isolated rural canters are fitted with PV for lighting, a refrigerator, a television and socket to supply kitchen appliances

View Publication Preview PDF
Publication Date
Thu Aug 15 2019
Journal Name
Scholarspace
Folklore as Resistance in Postcolonial Narratives and Cultural Practices: Hawaiian, African American, and Iraqi
...Show More Authors

Colonialism radically transformed the cultures of colonized peoples, often rupturing Indigenous traditions and folklore. Whether creating colonial discourse, promoting orientalist literature, advocating western educational institutions, or through biased media representations, imperial powers systematically oppressed Indigenous and Native peoples. Subjugated communities, however, created, and still form postcolonial discourse from their knowledge systems. This discourse insists on Indigenous and Native culture as central to Indigenous and Native peoples identity. This study examines the postcolonial literature of three groups: Kānaka Maoli, African Americans, and Iraqis. The scope of this dissertation scrutinizes how folklore is employed

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Field Study of Novel Storage Tank of Solar Water Heating System
...Show More Authors

In this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Calculation of Radial Electron-Electron Distribution function and Expectation Values for Li-Atom in Excited States 1s 2p, 1s 3p and 1s 3d
...Show More Authors

The electron correlation for inter-shells (1s 2p), (1s 3p) and (1s 3d) was described by the inter-particle radial distribution function f(r12). It was evaluated for Li-atom in the different excited states (1s2 2p), (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). The inter particle expectation values for these shells were also evaluated. The calculations were performed using Mathcad 14 program.

View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue Sep 18 2018
Journal Name
Kant
SOME METHODOLOGICAL OF LEARNING TENNIS STUDENTS
...Show More Authors

This study is due to insufficient development of the issues of initial training in tennis at youthful (student) age. Objective: development of a methodological and scientific-methodological base of students' tennis with current trends in tennis. Summing up the best practices of modern tennis, we came to the conclusion that the formation of the art of reflection backhands in teaching beginner students of sports specialization to achieve future success. In modern conditions in the development of Russian tennis student opens the possibility of using new technologies and programs. Using these approaches, we have developed a training program and tested students' tennis in the pedagogical experiment, which resulted in its effectiveness.

Publication Date
Fri Jun 29 2018
Journal Name
Journal Of Engineering
Finite Element Modeling and Parametric Study on Floor Steel Beam Concrete Slab System in Non-Composite Action.
...Show More Authors

This study aims to show, the strength of steel beam-concrete slab system without using shear connectors (known as a non-composite action), where the effect of the friction force between the concrete slab and the steel beam has been investigated, by using finite element simulation.

The proposed finite element model has been verified based on comparison with an experimental work. Then, the model was adopted to study the system strength with a different steel beam and concrete slab profile. ABAQUS has been adopted in the preparation of all numerical models for this study.

After validation of the numerical models, a parametric study was conducted, with linear and non-linear Regression analysis. An equation re

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref