Preferred Language
Articles
/
joe-1286
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At the receiver, the data will be recovered  using the same key, the received data is the same at the sender, so this result shows that the transceiver work normally and calculates the BER at the end each time the SNR changed. Our results indicate that the designed transmitter and receiver perform as usual and finally calculate the bit error rate when the signal to noise ratio is changed. The evaluation of BER indicates that simulated values are smaller than theoretical ones obtained using the BER tool. when SNR is equivalent to 7 dB, the theoretical and simulated BER obtained is 0.01695 and 0.00199, respectively. Designing soft defined radio transceiver using MATLAB  R  2011a  and system generator ISE14.1/SIMULINK.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Sumer Journal For Pure Science
COVID-19Disease Diagnosis using Artificial Intelligence based on Gene Expression: A Review
...Show More Authors

Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Removal of Water Turbidity by using Aluminum Filings as a Filter Media
...Show More Authors

The ability of using aluminum filings which is locally solid waste was tested as a mono media in gravity rapid filter. The present study was conducted to evaluate the effect of variation of influent water turbidity (10, 20and 30 NTU); flow rate(30, 40, and 60 l/hr) and bed height (30and60)cm on the performance of aluminum filings filter media for 5 hours run time and compare it with the conventional sand filter. The results indicated that aluminum filings filter showed better performance than sand filter in the removal of turbidity and in the reduction of head loss. Results showed that the statistical model developed by the multiple linear regression was proved to be
valid, and it could be used to predict head loss in aluminum filings

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Crescent Moon Visibility: A New Criterion using Deep learned Artificial Neural-Network
...Show More Authors

     Many authors investigated the problem of the early visibility of the new crescent moon after the conjunction and proposed many criteria addressing this issue in the literature. This article presented a proposed criterion for early crescent moon sighting based on a deep-learned pattern recognizer artificial neural network (ANN) performance. Moon sight datasets were collected from various sources and used to learn the ANN. The new criterion relied on the crescent width and the arc of vision from the edge of the crescent bright limb. The result of that criterion was a control value indicating the moon's visibility condition, which separated the datasets into four regions: invisible, telescope only, probably visible, and certai

... Show More
Preview PDF
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Vibration Control Analysis of a Smart Flexible Cantilever Beam Using Smart Material
...Show More Authors

This paper features the modeling and design of a pole placement and output Feedback control technique for the Active Vibration Control (AVC) of a smart flexible cantilever beam for a Single Input Single Output (SISO) case. Measurements and actuation actions done by using patches of piezoelectric layer, it is bonded to the master structure as sensor/actuator at a certain position of the cantilever beam.
The smart structure is modeled based on the concept of piezoelectric theory, Bernoulli -Euler beam theory, using Finite Element Method (FEM) and the state space techniques. The number of modes is reduced using the controllability and observability grammians retaining the first three
dominant vibratory modes, and for the reduced syste

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Mathematics For Applications
DIRICHLET PROCESS ANALYSIS USING BIORTHOGONAL WAVELET: A STATISTICAL STUDY OF FINANCIAL MARKET
...Show More Authors

The Dirichlet process is an important fundamental object in nonparametric Bayesian modelling, applied to a wide range of problems in machine learning, statistics, and bioinformatics, among other fields. This flexible stochastic process models rich data structures with unknown or evolving number of clusters. It is a valuable tool for encoding the true complexity of real-world data in computer models. Our results show that the Dirichlet process improves, both in distribution density and in signal-to-noise ratio, with larger sample size; achieves slow decay rate to its base distribution; has improved convergence and stability; and thrives with a Gaussian base distribution, which is much better than the Gamma distribution. The performance depen

... Show More
View Publication
Scopus
Publication Date
Thu Nov 13 2025
Journal Name
Journal Of Engineering
Aerodynamic Characteristics of a Rectangular Wing Using Non-Linear Vortex Ring Method
...Show More Authors

The aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky theorem of

... Show More
View Publication
Publication Date
Thu Sep 01 2022
Journal Name
Civil Engineering And Architecture
Strengthening AL-Kadhimin Tilted Minaret by Using a System of Micro-piles
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Al-khwarizmi Engineering Journal
Energy Saving of Heat Gain by Using Buried Pipe Inside a Roof
...Show More Authors

Abstract

    This work deals with a numerical investigation to evaluate the utilization of a water pipe buried inside a roof to reduce the heat gain and minimize the transmission of heat energy inside the conditioning space in summer season.     The numerical results of this paper showed that the reduction in heat gain and energy saving could be occurred with specific values of parameters, like the number of pipes per square meter, the ratio of pipe diameter to the roof thickness, and the pipe inlet water temperature. Comparing with a normal roof (without pipes), the results indicated a significant reduction in energy heat gain which is about 37.8% when the number of pipes per m

... Show More
View Publication Preview PDF