Communication
Dina S Akram; Haydar M. AL-Tamimi
Abstract
Linear and non-linear impairments are the major problems that affected the dense wavelength division multiplexing (DWDM) system performance. In this simulation designs, two different compensation techniques have been proposed to eliminate signal impairments. The repeater technique was ...
Read More ...
Linear and non-linear impairments are the major problems that affected the dense wavelength division multiplexing (DWDM) system performance. In this simulation designs, two different compensation techniques have been proposed to eliminate signal impairments. The repeater technique was proposed to reduce non-linear effects like four-wave mixing (FWM) which cause transfer power from DWDM channels to another new channels. The dispersion compensation fiber (DCF) technique was used to reduce dispersion effects which cause signal pulse broadening over long transmission distances. Also, three different modulation formats and four frequency separations were used to determine which modulation scheme is more compatible with the compensation techniques. The results is calculated in term of quality factor against power and noetic that the carrier suppressed return to zero (CSRZ) format offers the best performance with the DCF technique with 32.1804 Qfactor at 15dBm threshold power then, the differential phase shift keying (DPSK) format is compatible with the repeater technique with 27.7959 quality factor and 14dBm threshold power
Communication
Rawia Abdullah Muhammed; Maisa'a Abid Ali Al-Dabbas; Ashwak Mahmood Alabaichi
Abstract
The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing ...
Read More ...
The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing power, making themprime targets for hackers. The IoT environment uses lightweight cryptographic techniquesto address security requirements. Another security method for IoT devices issteganography. In the contemporary Internet era, the ability to secure private informationis crucial, and steganography offers this capability. Due to its great ability to concealsensitive data, video has drawn the attention of numerous academics among all forms ofdigital media. The main goal of this work is to examine several methods for fusing videosteganography and cryptography techniques. Additionally, a thorough investigation andevaluation of a variety of video steganography methods in both compressed and rawdomains are also emphasized. The comprehensive analysis of prior material makes iteasier to have in-depth knowledge while creating approaches that combine cryptographywith steganography.
Communication
Bushra T. Hashim; Hadi T. Ziboon; Sinan M. Abdulsatar
Abstract
A new technique called cognitive radio seeks to utilize the available spectrum.. Spectrum sensing is the fundamental cognitive radio component. There are many types of sensing spectrums, one of which is The Two Thresholds Based on Covariance Absolute Values (TTCAV) method. This method's confused region, ...
Read More ...
A new technique called cognitive radio seeks to utilize the available spectrum.. Spectrum sensing is the fundamental cognitive radio component. There are many types of sensing spectrums, one of which is The Two Thresholds Based on Covariance Absolute Values (TTCAV) method. This method's confused region, which is unsure whether it is a signal or noise, is one of its drawbacks. To solve this problem proposed two techniques, a 2-bit quantization technique and a 3-bit quantization technique. Both techniques use an adaptive threshold. The experimental results conducted using python version 3.7 and Jetson Nano kit show an improvement in the detection probability values after using the techniques. where the value of 𝑷𝒅= 80.2% for a 2-bit technique, 𝑷𝒅=90.3% for a 3-bit quantization technique,at SNR=-20 under smoothing factor L=3. The Monte Carlo was used to determine the effectiveness of the proposed techniques, and Binary Phase Shift Keying modulation BPSK. According to the experiment, the results after using the proposed techniques are better than before.
Communication
Zaid Hashim Jaber; Dheyaa Jasim Kadhim; Ahmed Sabah Al-Araji
Abstract
Massive Multiple-Input Multiple-Output (MIMO) is an extension of the conventional MIMO in the wireless systems which improves both of the access density and the spectral efficiency by adding a massive number of antenna array at the base station (BS). Massive MIMO increases the spectral efficiency by ...
Read More ...
Massive Multiple-Input Multiple-Output (MIMO) is an extension of the conventional MIMO in the wireless systems which improves both of the access density and the spectral efficiency by adding a massive number of antenna array at the base station (BS). Massive MIMO increases the spectral efficiency by using the beamforming. Besides, the beamforming in massive MIMO improves the energy efficiency by focusing the energy in the desired direction instead of the omnidirectional propagation. In this paper, we propose and discuss different beamforming objectives in both the uplink and the downlink channels. These proposed objectives can be either use the beamforming of the desired signal without nulling the interference or use the beamforming with interference nulling. The beamforming with nulling objectives have better performance than those without nulling but this leads to a higher computational complexity as well. The results of this paper show and compare the performance of these objective including the spectral efficiency and energy efficiency as well as the computational complexity.
Communication
Khasraw A. Abdulrahman; Jalal J Hamad Ameen
Abstract
The fifth generation (5G) of mobile technology is emerging as a advance communication network, delivering elevated speeds, coverage and reliability, this technology like other technologies not clear from drawbacks and limitations, 5G mobile system like other mobile systems 4G, 3G and 2G affected by interference ...
Read More ...
The fifth generation (5G) of mobile technology is emerging as a advance communication network, delivering elevated speeds, coverage and reliability, this technology like other technologies not clear from drawbacks and limitations, 5G mobile system like other mobile systems 4G, 3G and 2G affected by interference and signal quality is going to be decreased because of higher number of C-Node-Bs which is because higher frequency and smaller coverage, in this paper, interference effect has been studied with both types cochannel and adjacent channel, best case and worst cases has been presented simulated and calculated the signal to interference ratio vs cluster size for different pathloss exponents , models and techniques of minimizing this effect has been studied starting with 5G cell planning, then a proposed network using optical fiber between C- Node-Bs, the proposed network model will minimize the interference effect to about negligible level, results shown in this paper about total length of fiber optic cables and cluster size, also, an example with best cluster size has been presented.
Communication
Akam Hussein Hasan; Jalal J Hamad Ameen
Abstract
Since the need for larger data rates and wireless system radio networks has increased, several organizations in this industry have started to develop and implement their 5G mobile technology scenarios. Since mobile telecommunications' quick expansion has motivated companies to constantly plan and work ...
Read More ...
Since the need for larger data rates and wireless system radio networks has increased, several organizations in this industry have started to develop and implement their 5G mobile technology scenarios. Since mobile telecommunications' quick expansion has motivated companies to constantly plan and work from the first generation to the fourth generation of mobile technologies. MIMO systems and beamforming antenna arrays are expected to be very important. In the 5G wireless communication systems to be utilized after 2020, when they are paired with massive MIMO systems. In this paper, the main goal is to determine the benefits of beamforming techniques in massive MIMO systems in order to increase system throughput and reduce interference, thus eliminating and resolving the various technical challenges that are presented by the implementation of massive MIMO system architectures. The goal of this work is to contribute to the development of a 5G mobile system's C-Node-B base station transceiver. The suggested design makes use of a (64 x 64 MIMO) system and optimum the beamforming technology, MIMO parameters, and the primary fundamental parameters in beamforming.
Communication
Baydaa Sh. Z. Abood; Hanan A. R. Akkar; Amean Sh. Al-Safi
Abstract
Compression of images process is a step in the image processing. It is concerned with the transmission and storage of digitally created images. Fractal coding is a potential image and video compression approach with good reconstruction fidelity and relatively large compression ratios, because of its ...
Read More ...
Compression of images process is a step in the image processing. It is concerned with the transmission and storage of digitally created images. Fractal coding is a potential image and video compression approach with good reconstruction fidelity and relatively large compression ratios, because of its simplicity and great performance; fractal image compression (FIC) is a particularly popular approach in image compression applications. However, it has a significant disadvantage in the form of a long encoding time. This is because encoding any small bit necessitates a massive similarity search in the original data As a result; the FIC search time is reduced while the quality of the reconstructed images is maintained acceptable level in many introduced paper and other still a study topic in progress. Fractal images are images that are self-similar in that each individual part is the same as the total. This paper will discusses many attempts for more author that working on image and video compression using fractal compression technique based on various approach and with each discuss focuses on the main parameter of compression such compression ratio (CR), peak signal to noise ratio (PSNR) and encoding time, as well as the details of data set the used for testing also writing with each technique to creating fractal video and image compression.
Communication
Noora Nazar kamal; Qusay F. Al-Doori; Omar Alani
Abstract
Data theory coding is an excellent and well-known branch of study that has produced various crucial solutionsto the insoluble challenges of safe data transfers. Last improvements in detecting error techniques have resulted in a significant increase in the use of low-density parity-check (LDPC) code to ...
Read More ...
Data theory coding is an excellent and well-known branch of study that has produced various crucial solutionsto the insoluble challenges of safe data transfers. Last improvements in detecting error techniques have resulted in a significant increase in the use of low-density parity-check (LDPC) code to address critical concerns connected to secure data transfer. Until now, decent efforts have been performed on LDPC codes that target low complexity, high performance, and low bit error rate goals. The final aim of this review is to provide a recent literature understanding of modern improvements previously mentioned and in LDPC encoding and decoding (applicative and theoretical) techniques. A comparative scan of many remarkable LDPC decoding algorithms, 5G standard requirements, popular power management methods, and low-energy LDPC design studies is also shown. Lastly, conclusions are presented by outliningkey study results, current concerns, and general thoughts on new research directions possibilities.
Communication
Ghada K. Emad; Soukaena Hassan Hashiem
Abstract
Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission ...
Read More ...
Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for devices with limited computational functions and memory. On the other hand, most lightweight algorithms suffer from a trade-off between complexity and speed to produce a robust cipher algorithm. This paper evaluates the effectiveness of an image encryption technique that uses a Lightweight GIFT algorithm and logistic map equation-based dynamic DNA coding to create a secure, lightweight cipher algorithm for IoT devices. When we employed dynamic DNA coding by the binary bit method, we observed that the developed approach is more secure and has a high level of randomness due to the results. Additionally, the correlation between nearby pixels is approximately zero; there is no association between the two images. Therefore, the developed approach achieves a higher encryption efficiency when compared to the original algorithm.
Communication
Abdulqader Falhi Jabbar; Rana Fareed Ghani; Asia Ali Salman
Abstract
Road traffic accidents are one of the leading causes of mortality globally. Reducing the number of traffic-related incidents has become a serious socio-economic and public health problem, given the ever-increasing number of cars on the road. As a result, this paper proposes an intelligent vehicle prediction ...
Read More ...
Road traffic accidents are one of the leading causes of mortality globally. Reducing the number of traffic-related incidents has become a serious socio-economic and public health problem, given the ever-increasing number of cars on the road. As a result, this paper proposes an intelligent vehicle prediction communication mechanism that alerts drivers to any autos that may be overtaking or bypassing the targeted vehicle. The primary goal of this paper is to leverage modern Internet of Things (IoT) and wireless sensor technologies to predict any potential accident that may occur as a result of car accidents. This paper proposes the Collision Prediction of a Moving Vehicle (CPMV) system. The information acquired by CPMV will alert the driver to divert the vehicle in a reasonable amount of time before any harm occurs. It redirects the inbound object that emitted the Ultrasound signal which was received by the vehicle, to a safe location. The proposed system predicts collision between vehicles through Wi-Fi and Bluetooth, using a set of sensors with a precision of 360 degrees and a distance of collision prediction of one meter and at a speed of 200-300 revolutions per minute. The python programming language was utilized to code the programs that control the vehicle during the implementation of this project. The Raspberry Pi 4 is utilized as the controller to examine the vehicle’s spatial data. The test results showed that using this application to deal with an approaching object can be a successful strategy in the three proposed scenarios at different angles and directions.
Communication
Samir M. Hameed; Sinan M. Abdulsatar; Atheer Alaa Sabri
Abstract
Researchers have extensively utilized optical orthogonal frequency division multiplexing (O-OFDM) in visible light communication (VLC) to achieve high data rate transmission for free spectrum bandwidth. The peak-to-average power ratio (PAPR) is the critical challenge for VLC systems-based O-OFDM that ...
Read More ...
Researchers have extensively utilized optical orthogonal frequency division multiplexing (O-OFDM) in visible light communication (VLC) to achieve high data rate transmission for free spectrum bandwidth. The peak-to-average power ratio (PAPR) is the critical challenge for VLC systems-based O-OFDM that produces non-linearity and degrades performance. In this paper, a proposed model for PAPR reduction can be applied with different O-OFDM technologies. This model considered using -law companding with O-OFDM transmitter to compress high amplitude peaks and restore the signals using de-companding in the receiver. The obtained simulation results show an efficient achievement of about 75% PAPR reduction compared with the original O- OFDM for different techniques. Furthermore, The convolutional encoder with Viterbi decoder is used with our proposed model for improvement BER performance and tradeoff with PAPR. The BER performance for different coding schemes, O-OFDM technologies, and modulation orders has been graphed and compared. It can notice the convolutional encoder/Viterbi satisfies better BER than Hamming coding/decoding. However, the number of memory cells of the convolutional encoder plays an essential role in BER improvement.
Communication
Nada Hussain; Matheel Abdulmunim; Akbas Ezaldeen Ali
Abstract
Auto-Correction is the process of correcting a misspelled word typed by the user as an application of automated translation process. lip-reading is the process of recognizing the words through processing and observing the visual lip movement of a speaker’s talking without any audio input. Although ...
Read More ...
Auto-Correction is the process of correcting a misspelled word typed by the user as an application of automated translation process. lip-reading is the process of recognizing the words through processing and observing the visual lip movement of a speaker’s talking without any audio input. Although visual information itself cannot be considered as enough resource to provide normal speech as intelligibility, it may succeed with several cases especially when the words to be recognized are limited. Auto-correction is a trail to diminish the number of errors that can be generated by lip reading systems and to improve their accuracy, many error-correction techniques were visualized. In this paper an auto- correction model is proposed to correct the misspelled words recognized by a lip reading system, the output of a lip reading system is subjected to auto-correction model to enhance the accuracy of the system. The auto-correction model is based on levenshtien distance and dictionary lookup with a proposed dataset. The proposed model achieved accuracy of more than 67% enhancing the lip reading system by almost 30%.