Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 4 (2004)
A New Design for Linear Phase IIR Digital Filter with Efficient Realization

Dr.Jassim M.Abdul-Jabbar; Afaf A.Abood AL-Dearawy

Volume 5, Issue 1 , June 2005, Page 29-41

  Abstract: Linear phase requirement can be achieved by direct design with an FIR filter at the expense of high order and high computational burden for the given specification. Alternatively, IIR digital filters can be designed with much smaller order than their FIR counterparts, but at the expense ...  Read More ...



Volume 5, Issue 1 , June 2005, Page 42-57

  Abstract: The paper attempts to provide most of the well-known security services through a design and implementation of a client/server-based network security system. The system is based on recommendation of the Advanced Encryption Standard (AES) together with some secure techniques. These techniques ...  Read More ...

Systolic Digital Filter Architecture for Signal Identification

A. K. Sharief; Prof. Dr. W. A. Mahmoud

Volume 5, Issue 1 , June 2005, Page 58-64

  Abstract: The concern of the paper is to use novel approach to identify the signal. The approach represents the relation ship between the input and output through the systolic array structure, and drivers the relation directly from the transfer function of the digital filter, so that signal identification ...  Read More ...

A Proposed Firewall Security Method against Different Types of Attacks

Prof. Dr. Alaa AL-Hamami; Soukaena Hassan Hashem

Volume 5, Issue 1 , June 2005, Page 65-74

  Abstract: There are measures that can be taken to protect users from objectionable or inappropriate Internet content and secure the LAN from theft, modification, or deletion of data. Firewall is one of many security measures that can be used to protect networks. Although firewalls are powerful, they ...  Read More ...

An Error Concealment Algorithm Using Discrete Wavelet Transform

Atheer A. Sabri

Volume 5, Issue 1 , June 2005, Page 75-87

  Abstract: A new algorithm for error concealment of a completely lost blocks using the 1-D discrete wavelet transform is proposed in this paper. The transmission of block-coded images, fading in wireless channels can cause errors in entire blocks and consequently causes the loss of information of ...  Read More ...

Detection of Code – Division Multiple Access Signals based on Neural Network

ad AL-Shaban; Dr. Sa

Volume 5, Issue 1 , June 2005, Page 88-93

  Abstract: Artificial Neural Networks are employed for demodulation of spread spectrum signals in a multiple – access environment. In fact, the conventional matched filter receiver, when used in multi-user system, suffers from the interfering signals, so that when reducing this problem, we need ...  Read More ...

Genetic Algorithm and Elman Network Used For Tuning The Parameters Of The PID Neural Controller Based Model Reference

Mr. Ahmed Sabah Abdul Ameer Al-Araji

Volume 5, Issue 1 , June 2005, Page 94-109

  Abstract: A neural network-based self-tuning PID controller is presented. The scheme of the controller is based on using a modified Elman recurrent neural network as a selftuner for (PID) controller. The proposed method has the advantage of not necessarily using a combined structure of identification ...  Read More ...

Image files formats and Measuring Image Quality A comparative study and analysis of commonly used image file formats

Al-kenany S.H

Volume 5, Issue 1 , June 2005, Page 110-126

  Abstract: The core objectives of this research are to identify, understand and describe range of workable–based methods for quantitatively measuring the quality of an image represented in various file formats. Moreover, it suggests methods for measuring an image quality in varied graphic file formats. ...  Read More ...