Israa Shaker Tawfic
Volume 19, Issue 1 , January 2019, , Page 27-34
Abstract
within the next year, travelers from difference world may be holdinga new form of a passport.The electronic passport has been widespread in recenttimes, all around the world, since the e-passports can save biometricidentifiers.To forbidden the illegal entry of passengers into a particular stateand stop ...
Read More ...
within the next year, travelers from difference world may be holdinga new form of a passport.The electronic passport has been widespread in recenttimes, all around the world, since the e-passports can save biometricidentifiers.To forbidden the illegal entry of passengers into a particular stateand stop the use of fake documents, an e-passport is used for more preciseidentification of a person.The paper used the image of the e-Passport holder asa cover image to hide the fingerprint inside it within the operation of e-Passportdesign. This paper suggests also an encryption security analysis of the epassportrepresenting by using Arnold transform on fingerprint and add aprivet key to encrypted data that are aimed to provide more security to thebiometric information to protecting the e-passport.Our paper focuses on thesecurity features which are suggested to make the e-Passport safer and protectit from unauthorized access.
Mustafa M. Salih; Ahm ed S. Al-Araji1; Hassan A. Jeiad
Volume 20, Issue 4 , October 2020, , Page 29-47
Abstract
This paper presents an enhancement of the output performance of a linear buck converter system for the mobile (smartphone) devices using an adaptive digital Proportional–Integral–Derivative (PID) controller with off-line swarm optimization algorithm. The work focuses on improving the use ...
Read More ...
This paper presents an enhancement of the output performance of a linear buck converter system for the mobile (smartphone) devices using an adaptive digital Proportional–Integral–Derivative (PID) controller with off-line swarm optimization algorithm. The work focuses on improving the use of using single-input single-output (SISO) digital Field Programmable Gate Array (FPGA)-PID to control the linear buck converter system. The goal of the proposed adaptive SISO-FPGA-PID voltage-tracking controller is to rapidly and precisely identify the optimal voltage control action (optimal on-off duration time) that is used to control the buck converter output voltage level in order to avoid the troubleshooting hardware problem issues on mobile devices. The Particle Swarm Optimization (PSO) algorithms are used to find and tune the three weights of the SISO-FPGA-PID controller. The numerical simulation results and the experimental work using Spartan-3E xc3s500e-4fg320 board with Verilog hardware description language (HDL) show that the proposed controller is more accurate in terms of voltage error and the number of function evolutions are of high reduction. As well as to generate a smooth voltage control response without voltage oscillation in the output by investigating under mobile applications variations such as using Bluetooth, WI-FI, and CPU operating voltage when these results are compared with other controllers.
Mohammed Kasim Al-Haddad; Hadi T. Ziboon
Volume 19, Issue 2 , April 2019, , Page 30-40
Abstract
Filter Bank Multicarrier (FBMC) is a multitone modulationtechnique that is expected to replace the Orthogonal Frequency DivisionMultiplexing (OFDM) due to its inherent characteristics that makes it immuneto channel dispersive effect on the transmitted signal in both time andfrequency. The most effective ...
Read More ...
Filter Bank Multicarrier (FBMC) is a multitone modulationtechnique that is expected to replace the Orthogonal Frequency DivisionMultiplexing (OFDM) due to its inherent characteristics that makes it immuneto channel dispersive effect on the transmitted signal in both time andfrequency. The most effective ingredient in the FBMC is the pulse shaping thatthe OFDM symbol lacks. In this paper, a comparative study is presentedbetween different pulse shapes used in the FBMC like the RRC, PHYDIAS,IOTA and Hermite function alongside the conventional OFDM.
Mohammed Majid Msallam
Volume 20, Issue 1 , January 2020, , Page 31-39
Abstract
Recently, the world has been interested in transferring data between different devices. The transmission of data must be encrypted so that the intended receiver can only read and process a secret message. Hence, the security of information has become more important than earlier. This paper proposes the ...
Read More ...
Recently, the world has been interested in transferring data between different devices. The transmission of data must be encrypted so that the intended receiver can only read and process a secret message. Hence, the security of information has become more important than earlier. This paper proposes the least significant bit Steganography method to hide a secret message inside an image cover via using dynamic stego-key. To check the effectiveness of the proposed method, many factors are used for evaluation and compared with another method. The results illustrate more robustness at steganography since stego-key depends on the cover image to hide a secret message.
Liqaa A. Al-Hashime; Sinan M. Abdul Satar; Ghaida A. AL-Suhail
Volume 18, Issue 3 , December 2018, , Page 33-42
Abstract
Orthogonal Frequency Division Multiplexing is one of the mostimportant multiple carrier modulation format, which has many applications inwireless communication and optical communication. It is considered as anexcellent method for fast optical communication inferable from its high spectralefficiency and ...
Read More ...
Orthogonal Frequency Division Multiplexing is one of the mostimportant multiple carrier modulation format, which has many applications inwireless communication and optical communication. It is considered as anexcellent method for fast optical communication inferable from its high spectralefficiency and its strength to path losses. Peak to average power ratio isregarded as one of the main problems that are experienced by the opticalorthogonal frequency division multiplexing system, which directly affects thecharacteristics of the system. The current paper proposes an efficient techniqueto reduce Peak to Average Power Ratio by the modified Dursun’s method or theso called modified discrete sliding norm transformer in coherent opticalorthogonal frequency division multiplexing system for the first time to the baseof our knowledge consequently. The proposed technique does not need to sendside information to the receiver; also, it does not degrade bandwidth. Thisalgorithm lessens Peak to Average Power Ratio in the optical coherentOrthogonal Frequency Division Multiplexing system to about 4.15 dB atcomplementary cumulative distribution function (CCDF) probability of 10-3 andimproves the system performance.
sufyan zaben; Akbas Ezaldeen Ali
Abstract
Covid-19 is a deadly virus that has spread worldwide, causing millions of deaths. Chest X-ray is one of the most common methods of diagnosing the infection of Covid - 19. Therefore, this paper has presented an efficient method to detect Covid-19 through X-rays of the chest area through a Neural convolution ...
Read More ...
Covid-19 is a deadly virus that has spread worldwide, causing millions of deaths. Chest X-ray is one of the most common methods of diagnosing the infection of Covid - 19. Therefore, this paper has presented an efficient method to detect Covid-19 through X-rays of the chest area through a Neural convolution network (CNN). the proposed system has used a convolution neural network to classify the extracted features. Since CNN needs a set of data defined for training and testing, the proposed method used a public dataset of 350 pneumonia x-ray images, 300 viral images, and 350 normal images for evaluation. Besides, the proposed work achieved a satisfactory accuracy of 95% based on the X-ray image.
Control
Ruaa Hameed Ahmed; Montadher Sami Shaker
Abstract
The paper presents an observer-based estimation of sensor fault for control systems affected by friction force. In such systems, the non-linearity of friction force leads to deteriorating sensor fault estimation capability of the observer. Hence, the challenge is to design an observer capable of attaining ...
Read More ...
The paper presents an observer-based estimation of sensor fault for control systems affected by friction force. In such systems, the non-linearity of friction force leads to deteriorating sensor fault estimation capability of the observer. Hence, the challenge is to design an observer capable of attaining robust sensor fault estimation while avoiding the effects of friction. To overcome the highlighted challenge, an Unknown Input Observer (UIO) is designed to decouple the effects of friction as well as to estimate the state and sensor fault.The benefit of proposing UIO is to guarantee robust sensor fault estimation despite the highly non-linear disturbance in the form of friction. The gains of the UIO are computed through a single–step linear matrix inequality. Finally, an inverted pendulum simulation is presented to demonstrate the novel approach's performance effectiveness.
Index Terms—Robust fault estimation; Fault-Tolerant control; unknown input observer; Friction force; estimation/decoupling approach. Index Terms—Robust fault estimation; Fault-Tolerant control; unknown input observer; Friction force; estimation/decoupling approach.
Computer
Afrah Salman Dawood; Zena Mohammed Faris
Abstract
Recently, Deep Learning (DL) has accomplished enormous prosperity in various areas, like natural language processing (NLP), image processing, different medical issues and computer vision. Both Machine Learning (ML) and DL as compared to traditional methods, can learn and make better and enhanced use ...
Read More ...
Recently, Deep Learning (DL) has accomplished enormous prosperity in various areas, like natural language processing (NLP), image processing, different medical issues and computer vision. Both Machine Learning (ML) and DL as compared to traditional methods, can learn and make better and enhanced use of datasets for feature extraction. This paper is divided into three parts. The first part introduces a detailed information about different characteristics and learning types in terms of learning problems, hybrid learning problems, statistical inference and learning techniques; besides to an exhausted historical background about feature learning and DL. The second part is about the major architectures of DL with mathematical equations and clarified examples. These architectures include Autoencoders (AEs), Generative Adversarial Networks (GANs), Deep Belief Networks (DBNs), Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs) and Recursive Neural Networks. The third part of this work represents an overview with detailed explanation about different applications and use-cases. Finally, the fourth part is about hardware/ software tools used with DL.
Hiba Hamdi Hassan; Maisa'a Abid Ali Khodher
Abstract
Steganography includes hiding text, image, or any sentient information inside another image, video, or audio. It aims to increase individuals’ use of social media, the internet and web networks to securely transmit information between sender and receiver and an attacker will not be able to detect ...
Read More ...
Steganography includes hiding text, image, or any sentient information inside another image, video, or audio. It aims to increase individuals’ use of social media, the internet and web networks to securely transmit information between sender and receiver and an attacker will not be able to detect its information. The current article deals with steganography that can be used as machine learning method, it suggests a new method to hide data by using unsupervised machine learning (clustering k-mean algorithm). This system uses hidden data into the cover image, it consists of three steps: the first step divides the cover image into three clusterings that more contrast by using k-means cluster, the selects a text or image to be converted to binary by using ASCII code, the third step hides a binary message or binary image in the cover image by using sequential LSB method. After that, the system is implemented. The objective of the suggested system is obtained, using Unsupervised Machine Learning (K-mean technique) to securely send sensitive information without worrying about man-in-the-middle attack was proposed. Such a method is characterized by high security and capacity. Through evaluation, the system uses PSNR, MSE, Entropy, and Histogram to hide the secret message and secret image in the spatial domain in the cover image.
Control
Ali M. Majeed; Safanah M. Raafat; Najat M. Ramadhan
Abstract
Wireless Sensor Network (WSN) represents a key network in the present and future Internet of Things (IoT) technology. WSN has an uncountable number of applications and is commonly used to aggregate information and control the physical environment remotely through small embedded devices known as wireless ...
Read More ...
Wireless Sensor Network (WSN) represents a key network in the present and future Internet of Things (IoT) technology. WSN has an uncountable number of applications and is commonly used to aggregate information and control the physical environment remotely through small embedded devices known as wireless sensor nodes. Power consumption is one of the main challenges in WSN due to the limitation of power resources. Consequently, several techniques have been followed to optimize power consumption. The feedback control system is one of the routes that has been utilized to minimize power consumption in WSN using the mathematical model of power and rate control in WSN. In this paper, a concise review of various types of control systems that are deployed for power saving in WSN will be discussed. The comparison between the applied control strategies is the key finding.
Control
Ruaa S. Hassan; Farazdaq R. Yaseen
Abstract
Permanent Magnet Synchronous Motors (PMSM) are extensively used in the industry owing to their excellent efficiency, low weight/power ratio, and smooth torque with no or minimal ripple. Field Oriented Control (FOC) is a modern and effective approach for closed-loop controlling the speed of PMSM. In this ...
Read More ...
Permanent Magnet Synchronous Motors (PMSM) are extensively used in the industry owing to their excellent efficiency, low weight/power ratio, and smooth torque with no or minimal ripple. Field Oriented Control (FOC) is a modern and effective approach for closed-loop controlling the speed of PMSM. In this paper, three-level Space Vector Pulse Width Modulation (SVPWM) is proposed for minimizing harmonics in the output voltage inverter. sensorless approaches are performed by using Model Reference Adaptive System (MRAS) which eliminates mechanical uncertainties. Because mechanical sensors increase the cost, size, weight, and wiring complexity, employing PMSM with them is extremely difficult Tuning of Proportional Integral (PI) controller gains is performed by using the Whale Optimization Algorithm (WOA). The results show that the proposed controller enhances the system's performance. In the application of felid-oriented control to a PMSM, with simulation data to back it up the entire system is simulated using the MATLAB/Simulink tool.
Farah A. Thamer1; Haitham B. Al-Wakeel2; Taghreed Mohammadridha; Zeyid T. Ibraheem2
Volume 21, Issue 1 , March 2021, , Page 38-52
Abstract
The Microwave oven is a system used to convert the electromagneticenergy to thermal energy when the microwave cavity is loaded with a dielectricmaterial. The ordinary microwave ovens are not supported with complexfeatures for detecting parameters such as temperature, weight, and loadedmaterial availability. ...
Read More ...
The Microwave oven is a system used to convert the electromagneticenergy to thermal energy when the microwave cavity is loaded with a dielectricmaterial. The ordinary microwave ovens are not supported with complexfeatures for detecting parameters such as temperature, weight, and loadedmaterial availability. Due to the lack of material availability, several laboratoryand industrial applications require these features to switch off the oven. Thereflections of electromagnetic radiation inside an empty microwave oven lead tooven damage. An overview of the microwave oven characteristics andemergence of electromagnetic radiation inside a microwave oven is presentedin this study. The parameters measured inside the microwave oven, methods forpower attenuation in a microwave oven, microwave power detector, andmicrowave oven leakage are discussed as well. Moreover in the methodology ofthis work, proposed a new technique based on the measurement of leakedmicrowave power to control the microwave oven. The preliminary resultsshowed that the leakage measurement of electromagnetic power changes withthe state/phase of the material inside the microwave oven, which ensured thepossibility of the proposed promising technique. This work will be continued toconnect the microwave oven with a spectrum analyzer and computer viahardware and software interfaces depending on the methodology of this article.A computer code will be developed to read the measured power andautomatically switch off the microwave oven depending on materials state.
Amjad Jaleel Humaidi; Mohammed Ali S. Mohammed; Akram Hashim Hameed
Volume 18, Issue 2 , September 2018, , Page 39-52
Abstract
In the present work, the design of an L1 adaptive controller forposition control of a linear servo motor for X-Y table application has beendeveloped. The AC Permanent Magnet Linear Synchronous Servo Motor(PMLSM) is considered. A comparative study between L1 adaptive control andModel Reference Adaptive ...
Read More ...
In the present work, the design of an L1 adaptive controller forposition control of a linear servo motor for X-Y table application has beendeveloped. The AC Permanent Magnet Linear Synchronous Servo Motor(PMLSM) is considered. A comparative study between L1 adaptive control andModel Reference Adaptive Control (MRAC) has been made. The effectiveness ofthe L1 adaptive controller against uncertain parameters is analyzed based onsimulated results. Robustness characteristics of both L1 adaptive controller andmodel reference adaptive controller to different input reference signals anddifferent structures of uncertainty have been evaluated. The L1-adaptivecontroller could ensure uniformly bounded transient and asymptotic trackingfor input and output signals. Simulations based on MATLAB of an x-y tablebased on PMLSM with time-varying friction and disturbance are presented toverify the theoretical findings. The simulation results within the environment ofMATLAB/SIMULINK showed that L1-adaptive controller could give bettertracking performance, dynamic and steady-state characteristics, than thatobtained from MRAC for considered types of input and for various structures ofuncertainties.
Computer
Haider M. Al-Mashhadi; Hussain Jassim Fahad
Abstract
Electrical energy is one of the most important components of life today where different fields depend on it. The field of electrical energy distribution (electricity network), which transmits electrical energy from sources to consumers, is one of the most important areas that need to be developed and ...
Read More ...
Electrical energy is one of the most important components of life today where different fields depend on it. The field of electrical energy distribution (electricity network), which transmits electrical energy from sources to consumers, is one of the most important areas that need to be developed and improved. In addition to analyzing electrical energy consumption, it needs to forecast consumption and determine consumer behavior in terms of consumption and how to balance supply and demand. The research aims to analyze weather data and find the relation between the weather factors and energy consumption in order to prepare data to use as a suitable data in machine learning model for future use. This model analyzes the building consumption rate for a particular area and takes into account the weather factors that affect electrical energy consumption, where (temperature, dew point, ultraviolet index) are selects based on the correlation confidence and then divided these factors into a set of categories using the K-Means algorithm to show the effect of each factors on the other.
Suha M. Najem; Suhad kadhem
Abstract
With the speedy expansion of e-commerce, credit cards have also become rising vogue, and that makes online transactions sleek and suitable. In conjunction with rising in online transactions, credit card fraud also increasing, which contributes to losses incurred yearly. As a result, many deep and machine ...
Read More ...
With the speedy expansion of e-commerce, credit cards have also become rising vogue, and that makes online transactions sleek and suitable. In conjunction with rising in online transactions, credit card fraud also increasing, which contributes to losses incurred yearly. As a result, many deep and machine learning methods are produced to fix such as problems like Logistic Regression (LR), Support Vector Machine (SVM), Naïve Bayes (NB), and other algorithms, but the current models are still not accurate. Moreover, sometimes the used datasets still need further preprocessing, since that has been approved the important role of feature engineering in performance optimization. In this paper, effective feature engineering and feature selection methods have been produced for preprocessing the raw dataset, which was transformed with Exploratory Data Analysis (EDA). Then LightGBM, XGboost, and Random forest classifiers are used for fraud detection. Experiments show that the LightGBM and XGboost models achieved the best accuracy with 100% after applying further preprocessing on the dataset.
Computer
Noor Safaa; Montadher sami shaker
Abstract
This article presents a decentralized controller/observer for nonlinear large- scale interconnected systems with actuator fault. The proposal integrates a robust proportional-integral-derivative (PID) controller with the unknown input observer (UIO) to achieve closed-loop robustness against the interactions ...
Read More ...
This article presents a decentralized controller/observer for nonlinear large- scale interconnected systems with actuator fault. The proposal integrates a robust proportional-integral-derivative (PID) controller with the unknown input observer (UIO) to achieve closed-loop robustness against the interactions and the actuator faults. In this scheme, the PID controller is tuned using the Bacterial foraging optimization algorithm (BFO) algorithm. On the other hand, the unknown input observer can diagnose the actuator faults from the controller input. A numerical example consisting of two subsystems is adopted to clarify the effectiveness of the suggested method with a guarantee that the state estimation error is asymptotically converged to zero. The actuator faults have been added to the second subsystem, keeping the first subsystem free of fault. The simulation results demonstrated the influence of the interactions between subsystems, verifying that the unknown input observer can detect the actuator faults despite the presence of these interactions between the subsystems.
Noor J. Jihad; Sinan M. Abdul Satar
Volume 20, Issue 3 , July 2020, , Page 42-49
Abstract
Recently, optical wireless communication (OWC) technologies focused on a camera or an image sensor receiver have drawn specific attention in areas like the internet, indoor localization, motion detection, and intelligent transportation systems. Besides, panorama sensors are the subject of communications ...
Read More ...
Recently, optical wireless communication (OWC) technologies focused on a camera or an image sensor receiver have drawn specific attention in areas like the internet, indoor localization, motion detection, and intelligent transportation systems. Besides, panorama sensors are the subject of communications from picture sensors as receptors as the high-speed OWC strategy do not need any change to the existing network, so the difficulty and expense of deployment are very limited. So in this paper, a detailed review of the techniques of optical camera communication (OCC)has been presented. In addition to their function of localizing, tracking and recording motion. Through addressing several facets of OCC and their different implementations, this study varies from the latest literature on this topic. The first section of the current article is on standardization, Path classification, modulation, scripting, synchronization, and signal processing methods for OCC networks whereas the second section of the research discusses OCC-based localization, navigation, motion detection, and smart transport systems literature .Finally , OCC's problems and potential work directions have been addressed in the final section of the research.
Omar Abdul Razzaq Abdul Wahhab; .Ahmed S. Al-Araji1
Volume 21, Issue 2 , June 2021, , Page 44-58
Abstract
The goal of navigating a mobile robot is to find the optimal path to direct itsmovement, so path planning is the best solution to find the optimal path. Therefore, thetwo most important problems of path planning must be solved; the first is that the pathmust avoid collision with obstacles, and second ...
Read More ...
The goal of navigating a mobile robot is to find the optimal path to direct itsmovement, so path planning is the best solution to find the optimal path. Therefore, thetwo most important problems of path planning must be solved; the first is that the pathmust avoid collision with obstacles, and second it must reduce the length of the path to aminimum. This paper will discuss finding the shortest path with the optimum cost functionby using the Chaotic Particle Swarm Optimization (CPSO), and A*, compare the resultsbetween them and the proposed hybrid algorithm that combines A* and Chaotic ParticleSwarm Optimization (ACPSO) algorithms to enhance A* algorithm to find the optimalpath and velocities of the wheeled mobile robot. These algorithms are simulated byMATLAB in a fixed obstacles environment to show the effectiveness of the proposedalgorithm in terms of minimum number of an evaluation function and the shortest pathlength as well as to obtain the optimal or near optimal wheel velocities.
Ahmed H. Hadi; Waleed F. Shareef
Volume 20, Issue 2 , April 2020, , Page 33-46
Abstract
Due to the recent advancements in the fields of Micro Electromechanical Sensors (MEMS), communication, and operating systems, wireless remote monitoring methods became easy to build and low cost option compared to the conventional methods such as wired cameras and vehicle patrols. Pipeline Monitoring ...
Read More ...
Due to the recent advancements in the fields of Micro Electromechanical Sensors (MEMS), communication, and operating systems, wireless remote monitoring methods became easy to build and low cost option compared to the conventional methods such as wired cameras and vehicle patrols. Pipeline Monitoring Systems (PMS) benefit the most of such wireless remote monitoring since each pipeline would span for long distances up to hundreds of kilometers. However, precise monitoring requires moving large amounts of data between sensor nodes and base station for processing which require high bandwidth communication protocol. To overcome this problem, In-Situ processing can be practiced by processing the collected data locally at each node instead of the base station. This Paper presents the design and implementation of In-situ pipeline monitoring system for locating damaging activities based on wireless sensor network. The system built upon a WSN of several nodes. Each node contains high computational 1.2GHz Quad-Core ARM Cortex-A53 (64Bit) processor for In-Situ data processing and equipped in 3-axis accelerometer. The proposed system was tested on pipelines in Al-Mussaib gas turbine power plant. During test knocking events are applied at several distances relative to the nodes locations. Data collected at each node are filtered and processed locally in real time in each two adjacent nodes. The results of the estimation is then sent to the supervisor at base-station for display. The results show the proposed system ability to estimate the location of knocking event.
Bashar F. Midhat
Volume 19, Issue 1 , January 2019, , Page 35-41
Abstract
The DC-DC power converters have extreme importance incontemporary applications. Moreover, the DC-DC power converters are theideal candidates in numerous applications such as electric and hybrid vehicles,fuel cells and others. They have been extensively researched upon over threedecades. The control of ...
Read More ...
The DC-DC power converters have extreme importance incontemporary applications. Moreover, the DC-DC power converters are theideal candidates in numerous applications such as electric and hybrid vehicles,fuel cells and others. They have been extensively researched upon over threedecades. The control of these converters has been often implemented usingPWM techniques and based on discrete components and integrated circuits. Inthis paper we propose a systematic approach for the control of step down DCDCconverters with variable input voltage based on discontinuous controlaction. We demonstrate that the proposed algorithm achieves robustness tovariations of the converter load and the input voltage without additionalsensors.
Dhafer R. Zaghar; Hadeel N. Abdullah; Ikhlas M. Farhan
Volume 20, Issue 1 , January 2020, , Page 40-52
Abstract
The study and evaluation of digital communication systems in low signal-to-noise power ratio (LSNR) environments is a hot and important topic due to its wide contemporary applications. This review is an attempt to focus on the most distinctive vital parameters required in the analysis and design of such ...
Read More ...
The study and evaluation of digital communication systems in low signal-to-noise power ratio (LSNR) environments is a hot and important topic due to its wide contemporary applications. This review is an attempt to focus on the most distinctive vital parameters required in the analysis and design of such systems. It includes a brief literature survey for many algorithms, techniques, methodologies, and mitigations that have been used to overcome the high noise problem encountered in these systems in order to guarantee reliable communication. Amongst these topics, the study reviews the most widely utilized modulation techniques in LSNR communication systems such as the On-Off Keying (OOK) and binary PSK schemes. The capacity for both AWGN and wireless fading channels is also discussed along with a clarification of the minimum limits in these types of channels.On the other hand, some important and recommended detection and estimation techniques for low power communication systems are briefly covered. This unified study has additionally discussed spectral efficiency and bit energy trade-off within the low-power, and broadband systems, and different limitations are stated clearly. Finally, the survey throughout this paper recommends some significant techniques that can be used in the analysis and design of successful communication systems in LSNR regimes.
Esraa K. Hamed; Mohammed A. Munshid; Jassim K. Hmood
Volume 19, Issue 2 , April 2019, , Page 41-49
Abstract
in this paper, an analytical model is developed to estimate anonlinear phase noise (NPN) due to Kerr fiber nonlinearity and its interactionwith amplifier noise in mode division multiplexing (MDM) systems. Ouranalysis uses generalized coupled multimode nonlinear Schrödinger equations(MM- NLSE) that ...
Read More ...
in this paper, an analytical model is developed to estimate anonlinear phase noise (NPN) due to Kerr fiber nonlinearity and its interactionwith amplifier noise in mode division multiplexing (MDM) systems. Ouranalysis uses generalized coupled multimode nonlinear Schrödinger equations(MM- NLSE) that describe the propagation of the mode superimposing in theoptical fiber. The nonlinear phase noise versus channel power and transmissiondistance is evaluated by implementing our analytical model for LP01, LP11a,and LP11b spatial modes. Each mode carries a 4-QAM signal at a symbol rateof 20 Gsymbol/s. The results reveal that LP11 mode has a lower phase noisevariance than LP01 mode over entire transmission distances. Finally, the errorvector magnitude (EVM) versus channel power is quantified using an analyticalmodel.
Suha Irfan Abdulrahman; Atheer Alaa Sabri; Faez Fawwaz Shareef
Volume 18, Issue 3 , December 2018, , Page 43-51
Abstract
High data rate and bandwidth efficiency are the requirements of modernwireless systems. Most studies introduce different ways to develop communication systemsto meet these requirements. The researches in the last few years focused on the chaoticsystem as a chaotic modulation due to its nature. So that ...
Read More ...
High data rate and bandwidth efficiency are the requirements of modernwireless systems. Most studies introduce different ways to develop communication systemsto meet these requirements. The researches in the last few years focused on the chaoticsystem as a chaotic modulation due to its nature. So that the performances of variouschaotic modulation schemes (Initial Condition Modulation (ICM) and Chaotic Shift Keying(CSK)) in terms of bit error rate (BER), for different spreading factors are implemented inthis article and simulated using MATLAB 2016b simulation. The main objective of thispaper is to make a comparison of various chaotic modulation schemes under AWGNchannel and study the effect of the spreading factor (β) on the performance of differentchaotic modulation schemes, where the spreading factor (β) is the number of generatedchaotic signal samples during the bit period (Tb). Different values of spreading factor (12,16, 20, 40, 60, 80, and 100) samples are selected to implement various chaotic modulationschemes. The results show that the spreading factor value of (100) achieves goodperformance for all types of chaotic modulation schemes which are implemented here.Increasing the value of spreading factor over (100) such as (120, 140, and 180) will add alittle bit enhancement to the system, whilst the processing time will increase dramatically.
Donya Yasir Abdulhussain; Hala bahjat; Abdulmohsen Jaber Abdulhoseen
Abstract
Digitally, a large number of information was generated, stored and exchanged. This growth leads to problems that needed to solve. Digital watermarking has been one of the key terms to secure and authenticate the owner's information.
The watermarking image technology is a procedure for embedding secret ...
Read More ...
Digitally, a large number of information was generated, stored and exchanged. This growth leads to problems that needed to solve. Digital watermarking has been one of the key terms to secure and authenticate the owner's information.
The watermarking image technology is a procedure for embedding secret data into an original image. In this paper, encrypted holographic watermark image was proposed by using chaotic technique, which utilizing three distinct chaos maps: logistic, Arnold and Baker; to ensure the security to the system.
Performance evaluation of embedding and decrypted Watermark image measured by Peak to signal ratio (PSNR), Structural Similarity (SSIM), Mean square error (MSE), Root mean square (RMSE), and Normalize Root mean square (NRMSE).
Results and outcomes of measurements confirmed the robustness of the chaotic technique and also the Histogram showed the good distribution of the encrypted holographic image pixels and observed that the encrypted holographic image in bit are significantly uniform and different from that of the Watermark image that mean the encryption image in bit interleaver is change the level values and position of pixel and also good similarity SSIM about 0.9 for both test 1 and 2.
Maha Salah Asaad; Muayad Sadik Croock
Volume 20, Issue 4 , October 2020, , Page 48-57
Abstract
Wireless Sensor Networks (WSNs) can be the most important solution for several problems, particularly in emergency cases. Software engineering security for WSN can confirm four goals including confidentiality, integrity, authentication, and availability. In this paper, an authentication method for WSN ...
Read More ...
Wireless Sensor Networks (WSNs) can be the most important solution for several problems, particularly in emergency cases. Software engineering security for WSN can confirm four goals including confidentiality, integrity, authentication, and availability. In this paper, an authentication method for WSN is proposed based on lightweight authentication and key management protocol as well as concepts of software engineering. Moreover, the interleaving process is added to the adopted protocol to improve the security side. The proposed method uses a Kath hashing in addition to salt and hash: the MD5 algorithm. This is to provide an allowance for the authentication of the added node to join the network. The proposed method is tested over different case studies and the obtained results show the superior performance for it in terms of processing the added nodes.