Dr. Noaman M. Noaman
Volume 7, Issue 1 , June 2007, , Page 62-73
Abstract
Abstract
In this paper, an indirect field-oriented control (IFOC) induction machine drive
with a conventional PI and sliding mode controllers is presented. The robustness of ac
machine drive speed performance with these controllers is checked in terms of variation
of machine parameters.
The design ...
Read More ...
Abstract
In this paper, an indirect field-oriented control (IFOC) induction machine drive
with a conventional PI and sliding mode controllers is presented. The robustness of ac
machine drive speed performance with these controllers is checked in terms of variation
of machine parameters.
The design includes rotor speed estimation from measured stator terminal
voltages and currents. The estimated speed is used as feedback in an indirect vector
control system, such that the speed control is performed without the use of shaft
mounted transducers.
The high performance of the proposed control schemes under load disturbances
is studied via simulation cases. The components of the speed controlled indirect field-oriented
induction machine with the both controllers are simulated using SIMULINK,
while the dynamic of induction machine is simulated using the potential of S-function
block and its attached script file.
Bashra Kadhim Oleiwi; Prof Dr. Waladin K. Said
Volume 11, Issue 1 , June 2011, , Page 62-73
Abstract
Abstract:
This paper is concerned with the problem of boiler drum wall temperature estimation to limit thermal stresses. The boiler drum of AL-Mussiab thermal power station is taken as a case study. It deals with the fundamental issue that must be considered when applying a linear theory (i.e the Kalman ...
Read More ...
Abstract:
This paper is concerned with the problem of boiler drum wall temperature estimation to limit thermal stresses. The boiler drum of AL-Mussiab thermal power station is taken as a case study. It deals with the fundamental issue that must be considered when applying a linear theory (i.e the Kalman filter) to practical non-linear problems. The Kalman filter is applied to estimate boiler drum wall temperature using the outer surface temperature of boiler drum wall (measurable) variable. The classical estimator (Kalman filter) is simple but it requires a good dynamic model to give reliable results. The numerical test results showed that the estimator is efficient and works well and it converges to the correct conditions (to within 1C) in time about half an hour from boiler heating start up. The estimator is robust where 100% error in initial conditions did not seriously influence the transient time to produce correct estimated output.
Key words: Boiler drum wall modeling; Power station; Kalman filter application.
Ashwaq T. Hashim; Dr. Rasha Fahim Nathim; Gaidaa Saeed Mahdi
Volume 14, Issue 2 , August 2014, , Page 62-71
Abstract
Abstract – Encryption is mainly used to transmit the data over networks. There are so many techniques introduced which are used to protect the confidential image data from any unauthorized access. Multimedia data contains different types of data that includes text, audio, video, graphic, and images ...
Read More ...
Abstract – Encryption is mainly used to transmit the data over networks. There are so many techniques introduced which are used to protect the confidential image data from any unauthorized access. Multimedia data contains different types of data that includes text, audio, video, graphic, and images with the increasing use of multimedia data over internet; here comes a demand of secure multimedia data. Most of the encryption algorithm available is generally used for text data and not suitable for multimedia data. In this paper 256-bit RC5 in quadrate design has been proposed. It is a secret-key block cipher that uses good features of RC5 algorithm using another overall structure design. In RC5 quadrate design of F-functions will be used instead of rounds. To ensure improving the encryption performance; mainly for images characterized by reduced entropy, the implementation of both techniques has been realized for experimental purposes. Comparative study with traditional encryption algorithms shows the superiority of the modified algorithm.
.
Keywords – Cryptography, Image Encryption, RC5, Quadrate Design,
Emad k. Jbbar; Abdul mon; em S. Rahma
Volume 7, Issue 2 , December 2007, , Page 64-70
Abstract
Abstract:
The images have large amount of information and they are important object in modern database system, so there is a great need for efficient image indexing key as access and retrieval tool. In database systems the index key is an attribute which has unique value for all tuples of the relation ...
Read More ...
Abstract:
The images have large amount of information and they are important object in modern database system, so there is a great need for efficient image indexing key as access and retrieval tool. In database systems the index key is an attribute which has unique value for all tuples of the relation by “ name“ , “ numbers“ or any codes, this key aids to identify the tuples. In archive system a vast amount of digital images it is very necessary to find unique image index key to store it corresponding to its image and can use it to retrieval documents. So in the proposed algorithm we generate image index key which depends on extracting the key from the contents of the image itself, so such an image index key will contain the properties and characteristics of image, it is Unique, because its value depends on the value of image pixels. So it is a good method for image indexing , image verification , image ordering and checking the authenticity of retrieved image to prevent any juggle perhaps happening with the image by recomputing index keyword of retrieved image and comparing it with index keyword which is stored in database. Using shrinking method With Image Index Key Extracting algorithm (IIKE) reduce storage space of stored images.
Ali Y. Fatah; Ph.D; M.Sc; Laith A. AL-Mayahi
Volume 6, Issue 3 , December 2006, , Page 64-72
Dr. Abdul-Barry Raouf Sulaiman
Volume 6, Issue 1 , April 2006, , Page 64-71
Ali Y. Fattah; Falah Hasan Abdul-Baqi
Volume 15, Issue 3 , December 2015, , Page 64-76
Abstract
Abstract –High-capacity and long-haul transmission technologies are indispensable
to develop cost-effective optical transport networks. Optical communication is rapidly
advancing toward 1-Tera bit per second (Tb/s) and beyond transport. As the available
bandwidth of Standard Single-Mode Fiber (SSMF) ...
Read More ...
Abstract –High-capacity and long-haul transmission technologies are indispensable
to develop cost-effective optical transport networks. Optical communication is rapidly
advancing toward 1-Tera bit per second (Tb/s) and beyond transport. As the available
bandwidth of Standard Single-Mode Fiber (SSMF) is limited, high Spectral Efficiency
(SE) becomes an important issue. Coherent Optical Orthogonal Frequency-Division
Multiplexing (CO-OFDM) has become one of the promising candidates due to its high
SE and resilience to linear channel impairments such as Chromatic Dispersion (CD).
In this paper, based on Optisystem 11.0 software simulation platform, the performance
of a 1.6 Tb/s (16 x 100 Gb/s) PDM-CO-OFDM transmission system is investigated
invest by using QPSK modulation format and applying Polarization Interleaving
Scheme (PIS) over 1440 km with 2 b/s/Hz spectral efficiency.
Dr.Farazdaq R. Yasien; Hala W. Khalid
Volume 18, Issue 1 , April 2018, , Page 64-81
Abstract
This paper presents a new approach in the modeling and the design of sensorless control method for the Permanent Magnet Synchronous Motor (PMSM) based on the use of the Extended Kalman Filter (EKF). The fourth order EKF is proposed to estimates the states: motor speed ω, rotor angular position, ...
Read More ...
This paper presents a new approach in the modeling and the design of sensorless control method for the Permanent Magnet Synchronous Motor (PMSM) based on the use of the Extended Kalman Filter (EKF). The fourth order EKF is proposed to estimates the states: motor speed ω, rotor angular position, θ and the currents from the measured currents and voltages. The linearization of the nonlinear PMSM model is done in the α_β coordinate system to perform the operation of the EKF.The three phases Space Vector Pulse Width Modulation (SVPWM) inverter usually implemented as a part of the Field Oriented Control (FOC) strategy which has become a standard in the control of PMSM.
Lect. Ghanim Abd Al-Kareem
Volume 11, Issue 2 , December 2011, , Page 65-78
Abstract
Abstract:
Orthogonal Frequency Division Multiplexing (OFDM) is a very attractive technique for high bit rate data transmission in a multipath fading environment that causes intersymbol interference (ISI). In this paper, two steps are used to improve the error rate performance of OFDM system. First, ...
Read More ...
Abstract:
Orthogonal Frequency Division Multiplexing (OFDM) is a very attractive technique for high bit rate data transmission in a multipath fading environment that causes intersymbol interference (ISI). In this paper, two steps are used to improve the error rate performance of OFDM system. First, we proposed the Slantlet Transform (SLT) used instead of Fast Fourier Transform (FFT) to obtain high orthogonality properties between subcarriers and hence reduce (ISI). Second, we proposed the Low Density Parity Check (LDPC) Codes for the proposed SLT-OFDM system to improve the Bit Error Rate (BER) and Packet Error Rate(PER) performance.
The goal of the proposed SLT method is to reduce the energy needed to transmit data on a fading channel and to decrease the number of complex computations(addition and multiplication) and hence increase the speed of the system in addition to obtaining high orthogonality between subcarriers. Hence, the proposed LDPC-based SLT-OFDM system is a promising solution to high efficient data transmission over fading channels. The proposed system has been tested and validated using MATLAB 7 package.
Prof. Dr. Alaa AL-Hamami; Soukaena Hassan Hashem
Volume 5, Issue 1 , June 2005, , Page 65-74
Abstract
Abstract:
There are measures that can be taken to protect users from objectionable or
inappropriate Internet content and secure the LAN from theft, modification, or deletion
of data. Firewall is one of many security measures that can be used to protect networks.
Although firewalls are powerful, they ...
Read More ...
Abstract:
There are measures that can be taken to protect users from objectionable or
inappropriate Internet content and secure the LAN from theft, modification, or deletion
of data. Firewall is one of many security measures that can be used to protect networks.
Although firewalls are powerful, they suffer from many types of attacks.
This paper concentrates on one particular aspect, which is providing firewalls
security against five types of attacks. These attacks are: SYN Flooding, Ping of Death,
IP Address Spoofing, Impersonate one-half of a Session and Session Hijacking. This
can be done by building a specific strategy for a firewall; a strategy that has three
procedures, some of which could be stood for more than one attack.
Awad Kadhim Hammoud; Hattam Nahi Muhaisen
Volume 13, Issue 3 , December 2013, , Page 65-72
Abstract
Abstract – Pattern recognition problems computer based are very important and
essential in our real life. There are many approaches have been used in pattern
recognition problem such as: Fourier Descriptor, Moment Invariant. But the main defect
of these methods is the long time processing and large ...
Read More ...
Abstract – Pattern recognition problems computer based are very important and
essential in our real life. There are many approaches have been used in pattern
recognition problem such as: Fourier Descriptor, Moment Invariant. But the main defect
of these methods is the long time processing and large computer space. This paper,
presents a new approach Artificial Intelligence, of Rule Induction technique. By this
approach, the essential and specific features of object have been extracted from contour
of object to be recognized. The characteristic of these features are easy computed and
requires fewer amounts of time and space, then high speed in recognition and decision.
Such features are (number of curves inside the fingerprint, number of check point for
each curve). It gives good and accurate results. We test the performance of this system
using many contours of fingerprint, and get good and accurate results.
Asst. Prof. Dr. Shibly Ahmed Al-Samarraie; Lect. Yasir Khudhair Al-Nadawi; Mustafa Hussein Mishary; Muntadher Mohammed Salih
Volume 15, Issue 2 , August 2015, , Page 65-74
Abstract
Abstract – The electronic throttling angle control system is the newly common
requirement trend in automotive technology. It is used to regulate the amount of air flow
into the engine. Due to the existence of multiple non-smooth nonlinearities, the
controller design to the electronic throttle valve ...
Read More ...
Abstract – The electronic throttling angle control system is the newly common
requirement trend in automotive technology. It is used to regulate the amount of air flow
into the engine. Due to the existence of multiple non-smooth nonlinearities, the
controller design to the electronic throttle valve becomes a difficult task. These
nonlinearities including stick–slip friction, backlash, and a discontinuous nonlinear
spring involved in the system. The designed controller in the present work consists of
the estimated perturbation term with a negative sign (used to cancel the perturbation
term) and a stabilizing term used to stabilize the nominal system model. The
perturbation term consists of the external unknown input and the uncertainty in throttle
valve model including the nonlinear terms. The utilized estimator uses the sliding mode
control theory and based on the equivalent control methodology. The simulation results
show the effectiveness of the proposed controller in estimating the perturbation term.
And then in forcing the angle of the throttle valve to follow the desired opening angle in
presence of nonlinearities and disturbances in throttle system model and the variation in
its parameters.
Mr. AHMED MUDHER HASSAN
Volume 8, Issue 1 , December 2008, , Page 67-78
Abstract
Abstract:
The integration of global positioning system (GPS) and Inertial Navigation System (INS) are continuously gaining interests in many positioning and navigation applications. Both systems have their unique features and shortcomings. Their integration offers systems that overcome each of their ...
Read More ...
Abstract:
The integration of global positioning system (GPS) and Inertial Navigation System (INS) are continuously gaining interests in many positioning and navigation applications. Both systems have their unique features and shortcomings. Their integration offers systems that overcome each of their drawbacks and maximize each of their benefits. An INS/GPS integration method based on Artificial Neural Networks (ANNs) to fuse INS measurements and GPS measurements has been suggested. It is also provide high performance INS/GPS integration with accurate prediction for position
And velocity components during GPS signal absence. Thus the integration of the two systems presents a number of advantages and overcomes each systems inadequacy. An ANN was adopted in this paper using position and velocity update architectures and utilizing the window based weight updating strategy to updates the navigation knowledge in the strategy using two data test IMU systems.
Lubna Zaghlul Bashir; Zina Waleed
Volume 12, Issue 1 , June 2012, , Page 69-95
Abstract
Learning Classifier Systems (LCS), are a machine learning technique which
combines reinforcement learning, evolutionary computing and other heuristics to
produce adaptive systems. The system HRC (Human – Rat - Cheese) focuses in
creating artificial creature (Rat) using computer simulation, and learning ...
Read More ...
Learning Classifier Systems (LCS), are a machine learning technique which
combines reinforcement learning, evolutionary computing and other heuristics to
produce adaptive systems. The system HRC (Human – Rat - Cheese) focuses in
creating artificial creature (Rat) using computer simulation, and learning it how to
choose between two different basic behaviors, (approach / escape) combining them to
perform complex behavior, which represents the final response in changing
environment.
The HRC is built of two-classifier subsystems working together, each
classifier system learns a simple behavior, and the system as a whole has as its learning
goal the control of activities. Flat architecture was used. The flat organization allows
distinguishing between two different learning activities: the learning of basic behavior
and the learning of switch behavior. One classifier system learns basic behavior,
(approach/escape), i.e., it is used to learn the simulated robot single step movement in
every direction in the environment. Whereas the other classifier system learns to control
the activities of basic classifier systems, i.e., it is used to learn to choose between basic
behaviors using suppression as a composition mechanism to chose between two basic
behaviors which represent complex behavior.
Simple experiments were executed for HRC: comparing and contrasting the
effect of the reinforcement learning using reward & punishment with learning using
reward only. Experiment results show that the run using reinforcement learning with
reward only is unable to perform as well as the run with reinforcement learning with
reward and punishment.
Dr. Mohamed Jasim Mohamed; Mrs. Farah S. Khoshaba
Volume 12, Issue 2 , December 2012, , Page 69-80
Abstract
Abstract: In this paper, a new Enhanced Genetic Algorithm (EGA) is used to find the best global path planning for a mobile robot according to a specific criterion. The EGA is enhanced by a new encoding method, new initial population creation method, new crossover and mutation operations as well as ...
Read More ...
Abstract: In this paper, a new Enhanced Genetic Algorithm (EGA) is used to find the best global path planning for a mobile robot according to a specific criterion. The EGA is enhanced by a new encoding method, new initial population creation method, new crossover and mutation operations as well as new additional operations correction operation and classification operation. The study considers the case when the mobile robot works in a known static environment. The new proposed algorithm is built to help the mobile robot to choose the shortest path without it colliding with the obstacles allocated in a working known environment. The use of grid map in the environment helps to locate nodes on the map where all nodes are assigned by coordinate values. The start and the target nodes of the required path are given prior to the proposed algorithm. Each node represents a landmark that the mobile robot either passes through only one time or never passes through during its journey from start node to the target node. Two examples of known static mobile robot environments with many obstacles in each one are studied and the proposed algorithm is applied on them. The results show that the proposed algorithm is very reliable, accurate, efficient and fast to give the best global path planning for the two cases.
Omar Farouq Lutfy
Volume 16, Issue 1 , December 2016, , Page 69-83
Abstract
Abstract – This paper presents an improved micro artificial immune (IMAI) algorithm utilizing basic concepts from swarm intelligence. In particular, to enhance the searching capability of the recently developed micro artificial immune system (Micro-AIS) algorithm, employed honey bees are recruited ...
Read More ...
Abstract – This paper presents an improved micro artificial immune (IMAI) algorithm utilizing basic concepts from swarm intelligence. In particular, to enhance the searching capability of the recently developed micro artificial immune system (Micro-AIS) algorithm, employed honey bees are recruited to provide high-quality antibodies for the working population of the IMAI algorithm. The proposed algorithm is used to find the optimal kernel values for the Volterra series model to identify nonlinear systems. To demonstrate the efficiency of the proposed method, three different types of nonlinear systems are considered, including a highly nonlinear rational system, a heat exchanger, and a continuous stirred tank reactor (CSTR). For all these systems, the IMAI algorithm has achieved accurate modelling results and fast convergence rates. Moreover, a comparative study was conducted with other optimization methods, namely the original Micro-AIS algorithm, the improved particle swarm optimization (IPSO), the real-coded genetic algorithm (GA), the least mean squares (LMS), the least mean p-norm (LMP), and the least mean absolute deviation (LMAD). From this comparative study, the proposed IMAI algorithm has achieved the best modelling performance compared to the other methods.
Sawsan Abdul-Majid; Saleh AL.Qaraawy; Yousra Abdul-Sahib
Volume 6, Issue 2 , August 2006, , Page 70-80
Abstract
Abstract:
WDM (wavelength division multiplexing) is a powerful technique available to meet
the ever-increasing demand for communication bandwidth. Among the WDM
techniques, the grating is widely used. Fiber gratings selectively reflect a narrow range
of wavelengths; this becomes important in designing ...
Read More ...
Abstract:
WDM (wavelength division multiplexing) is a powerful technique available to meet
the ever-increasing demand for communication bandwidth. Among the WDM
techniques, the grating is widely used. Fiber gratings selectively reflect a narrow range
of wavelengths; this becomes important in designing demultiplexers.
This paper presents a design idea to build a WDM demultiplexer component using
Fiber Bragg Grating (FBG). The results obtained reveal that the suggested design is
powerful in achieving accurate demultiplexer design. We aim to demonstrate the high
level accuracy, the time and cost saving from using the latest state of art software. The
performance was measured using quality factor (Q. Factor) and bit error rate (BER),
available via visualizers Component Library, included in Optisystem simulator.
Hayder Sabah. Abad Al-Amir
Volume 7, Issue 2 , December 2007, , Page 71-82
Abstract
Abstract:
In this paper, fuzzy brake controller is proposed. It is build by using the theory of fuzzy sets. The rules base of this controller are based on the previous knowledge and experiences in vehicle field.
The working of controller reduces the vehicle velocity to achieve the safe distance in ...
Read More ...
Abstract:
In this paper, fuzzy brake controller is proposed. It is build by using the theory of fuzzy sets. The rules base of this controller are based on the previous knowledge and experiences in vehicle field.
The working of controller reduces the vehicle velocity to achieve the safe distance in front between the vehicle and anther vehicle that traveling in front of it. So the controller prevents the slip in the tires during braking.
The velocity error and distance error are used as inputs and brake force as control action output for the controller.
The simulations of fuzzy controller with nonlinear brake vehicle model give acceptable responses for different cases.
Azhar Malik
Volume 13, Issue 2 , August 2013, , Page 71-80
Abstract
Abstract:One of the methods introduced for accomplishing hidden communication
is the steganography technique. Steganography is an important area of research in recent
years involving a number of applications. It is the science of embedding information
into the cover image, text and video without causing ...
Read More ...
Abstract:One of the methods introduced for accomplishing hidden communication
is the steganography technique. Steganography is an important area of research in recent
years involving a number of applications. It is the science of embedding information
into the cover image, text and video without causing statistically significant
modification to the cover image. This paper proposes an image steganography system; it
hides the gray level image on another gray level image by using optimal resilient
Boolean functions. First, it starts by encrypting secret image by using optimal resilient
function then embedding encrypted image inside a cover image by using DCT. The new
proposal system of image encryption has been investigated by encrypting the powerful
frequency coefficients in DCT using a saturated best resilient Boolean function (SRB)
that constructed by Zhang's construction. The simulation results of the proposal system
have calculated the peak signal to noise ratio (PSNR) and the correlation test in order to
compare between the cover image and the stego image and the results have also
calculated the correlation test between the secrete image and the extraction image as a
parameter of robustness. The experimental results have showed that the images can be
embedded by steganography and optimal resilient Boolean function with smaller
correlation compared to the original secret image and the extraction image. Finally, it is
observed that for all images, PSNR is greater than 55.
Thaker Mahmood Nayl
Volume 17, Issue 1 , December 2017, , Page 71-82
Abstract
This article presents design and evaluation of a sliding mode control scheme,
being applied to the case of an articulated vehicle. The proposed Sliding Mode Controller
(SMC) is based on a continuous sliding surface, being introduced for reducing the
chattering phenomenon, while achieving a better ...
Read More ...
This article presents design and evaluation of a sliding mode control scheme,
being applied to the case of an articulated vehicle. The proposed Sliding Mode Controller
(SMC) is based on a continuous sliding surface, being introduced for reducing the
chattering phenomenon, while achieving a better tracking performance and a fast
minimization of the corresponding tracking error. The derivation of the sliding mode
controller relies on the fully nonlinear kinematic model of the articulated vehicle, while the
overall stability of the control scheme is proven based on the Lyapunovs stability condition.
The performance of the established control scheme is evaluated through circle path
tracking scenario on a small-scale articulated vehicle
Manal; Hannan A. R. Akkar; Mutaz S. Abdul-Wahab
Volume 9, Issue 1 , December 2009, , Page 72-94
Abstract
Abstract:
This paper uses the theory of stochastic arithmetic as a solution for the FPGA implementation of a complex feed forward, multi layered neural network. Compared with the traditional digital implementations, the stochastic approach simplifies the computation involved and saves digital resources. ...
Read More ...
Abstract:
This paper uses the theory of stochastic arithmetic as a solution for the FPGA implementation of a complex feed forward, multi layered neural network. Compared with the traditional digital implementations, the stochastic approach simplifies the computation involved and saves digital resources. The architecture combines stochastic computation techniques with a novel Look Up-Table-based that fully exploits the Look Up-Table structure of many FPGAs. Basic operations of simple ANN are mapped into a modular design. The system control module, random pulse generating module , bit stream generating module , LFSR_32(Liner Feedback Shift Register) sub module, modulator sub module, neuron module and bit stream converter module , are described in hardware using a schematic editor of the Foundation 4.1i, which is a software tool from Xilinx. Thus the modules can be parameterized, providing easy scalability of the system to the different applications constraints and requirements. The feasibility of the proposed ANN is demonstrated by testing it using two case studies. The objective of the first test is the to decomposition of Boolean Function sets (AND, OR, EXOR) the simulation results show that the design is able to find the obtainable values for the functions, while, the objective of the second test is to find the frequency recognition for square wave with different frequencies, the simulation results show that the design is suitable for using in this field.
Mothena Fakhri Shaker; Prof Dr. Waladin K. Said
Volume 10, Issue 1 , December 2010, , Page 72-84
Abstract
Abstract:
The UOTCS (University Of Technology Control System) helicopter system is a laboratory scale experimental platform developed primarily for teaching system dynamics and control engineering principles to undergraduate students. It also provides an excellent research platform for control and mechatronics ...
Read More ...
Abstract:
The UOTCS (University Of Technology Control System) helicopter system is a laboratory scale experimental platform developed primarily for teaching system dynamics and control engineering principles to undergraduate students. It also provides an excellent research platform for control and mechatronics postgraduate students. This paper is concerned with the modeling and controllers design for the UOTCS helicopter to mimics its motion. The kinematics model was derived following the Denavit-Hartenberg theory while the dynamic model was based on Euler-Lagrange equations of motion. The helicopter mathematical model includes the inertias of the counterweight, the beams and the propeller motors. This model was found competent enough for this application as it describes the dominant behaviors and coupling among the degrees of freedom of the helicopter model. Fuzzy logic controllers for elevation and pitch motion control were designed. The performance of the FLC is compared with the classical PID controller and the results are evaluated. Fuzzy logic controllers are suitable to control the elevation and pitch motions of the UOTCS helicopter.
Dr. Ali A. Ali; Dr. M. S. AbdulWahab; Mr. Azad R. Kareem
Volume 5, Issue 2 , December 2005, , Page 72-78
Abstract
Abstract:
In this paper, a new method for the design of the broadband RF/microwave amplifiers
employing distributed amplification is presented. It proposes to use stages with asymmetric
lumped elements (inductances and capacitances) in the gate and drain circuits of the
amplifier instead of symmetric ...
Read More ...
Abstract:
In this paper, a new method for the design of the broadband RF/microwave amplifiers
employing distributed amplification is presented. It proposes to use stages with asymmetric
lumped elements (inductances and capacitances) in the gate and drain circuits of the
amplifier instead of symmetric elements in order to control the frequency response and to
achieve a flat gain over a large bandwidth. The need for impedance matching problems is
also solved. Simulation result obtained demonstrates that the new design gives better
frequency response as compared to the conventional distributed amplifiers even without
optimization.
Ashwaq T. Hashim
Volume 6, Issue 1 , April 2006, , Page 72-84
Dr. Shaimaa H. Shaker
Volume 14, Issue 1 , April 2014, , Page 72-82
Abstract
Abstract –Cryptographic hash functions have been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and the most important of which is their use in the composition of efficient Message Authentication Codes (MACs). Cryptanalysts cannot break ...
Read More ...
Abstract –Cryptographic hash functions have been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and the most important of which is their use in the composition of efficient Message Authentication Codes (MACs). Cryptanalysts cannot break the encryption code authorization message because they could not generate the message sets without key predictors.
This paper introduces anew way to achieve hash code authorization message to increase the strength of the code, reluctance to Birthday attack, and key’s exhaustive search. Secret key with randomness propertyis generated with the assistance proposed algorithm called AKG (Algorithm of Key Generator) that will be hash function. AKG is used to generate a secret key with decimal digits instead of (0,1).The proposed AKG introduces a method that uses three inputs of (0..9994) states instead of (0,1) states.The output of AKG is a random key from key generator using 9995 tables. So the new method provides authentic and integral properties.