Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for communication-systems

Article
Enhanced Bundle-based Particle Collision Algorithm for Adaptive Resource Optimization Allocation in OFDMA Systems

Haider M. AlSabbagh, Mohammed Khalid Ibrahim

Pages: 21-32

PDF Full Text
Abstract

The necessity for an efficient algorithm for resource allocation is highly urgent because of increased demand for utilizing the available spectrum of the wireless communication systems. This paper proposes an Enhanced Bundle-based Particle Collision Algorithm (EB-PCA) to get the optimal or near optimal values. It applied to the Orthogonal Frequency Division Multiple Access (OFDMA) to evaluate allocations for the power and subcarrier. The analyses take into consideration the power, subcarrier allocations constrain, channel and noise distributions, as well as the distance between user's equipment and the base station. Four main cases are simulated and analyzed under specific operation scenarios to meet the standard specifications of different advanced communication systems. The sum rate results are compared to that achieved with employing another exist algorithm, Bat Pack Algorithm (BPA). The achieved results show that the proposed EB-PAC for OFDMA system is an efficient algorithm in terms of estimating the optimal or near optimal values for both subcarrier and power allocation.

Article
Medical Communication Systems Utilizing Optical Nanoantenna and Microstrip Technology

Munaf Fathi Badr, Ibrahim A. Murdas, Ahmed Aldhahab

Pages: 137-153

PDF Full Text
Abstract

Many technical approaches were implemented in the antenna manufacturing process to maintain the desired miniaturiza- tion of the size of the antenna model which can be employed in various applied systems such as medical communication systems. Furthermore, over the past several years, nanotechnology science has rapidly grown in a wide variety of applications, which has given rise to novel ideas in the design of antennas based on nanoscale merits, leading to the use of antennae as an essential linkage between the human body and the different apparatus of the medical communication system. Some medical applications dealt with different antenna configurations, such as microstrip patch antenna or optical nanoantenna in conjugate with sensing elements, controlling units, and monitoring instruments to maintain a specified healthcare system. This study summarizes and presents a brief review of the recent applications of antennas in different medical communication systems involving highlights, and drawbacks with explores recommended issues related to using antennas in medical treatment.

Article
Adaptive OFDMA Resource Allocation using Modified Multi-Dimension Genetic Algorithm

Mohammed Khalid Ibrahim, Haider M. AlSabbagh

Pages: 103-113

PDF Full Text
Abstract

A considerable work has been conducted to cope with orthogonal frequency division multiple access (OFDMA) resource allocation with using different algorithms and methods. However, most of the available studies deal with optimizing the system for one or two parameters with simple practical condition/constraints. This paper presents analyses and simulation of dynamic OFDMA resource allocation implementation with Modified Multi-Dimension Genetic Algorithm (MDGA) which is an extension for the standard algorithm. MDGA models the resource allocation problem to find the optimal or near optimal solution for both subcarrier and power allocation for OFDMA. It takes into account the power and subcarrier constrains, channel and noise distributions, distance between user's equipment (UE) and base stations (BS), user priority weight – to approximate the most effective parameters that encounter in OFDMA systems. In the same time multi dimension genetic algorithm is used to allow exploring the solution space of resource allocation problem effectively with its different evolutionary operators: multi dimension crossover, multi dimension mutation. Four important cases are addressed and analyzed for resource allocation of OFDMA system under specific operation scenarios to meet the standard specifications for different advanced communication systems. The obtained results demonstrate that MDGA is an effective algorithm in finding the optimal or near optimal solution for both of subcarrier and power allocation of OFDMA resource allocation.

Article
Adaptive Noise Cancellation for speech Employing Fuzzy and Neural Network

Mohammed Hussein Miry, Ali Hussein Miry, Hussain Kareem Khleaf

Pages: 94-101

PDF Full Text
Abstract

Adaptive filtering constitutes one of the core technologies in digital signal processing and finds numerous application areas in science as well as in industry. Adaptive filtering techniques are used in a wide range of applications such as noise cancellation. Noise cancellation is a common occurrence in today telecommunication systems. The LMS algorithm which is one of the most efficient criteria for determining the values of the adaptive noise cancellation coefficients are very important in communication systems, but the LMS adaptive noise cancellation suffers response degrades and slow convergence rate under low Signal-to- Noise ratio (SNR) condition. This paper presents an adaptive noise canceller algorithm based fuzzy and neural network. The major advantage of the proposed system is its ease of implementation and fast convergence. The proposed algorithm is applied to noise canceling problem of long distance communication channel. The simulation results showed that the proposed model is effectiveness.

Article
Radio Contact Establishment Out of Iraqi Boarder using Nicosia Ionosonde Real data

Ahmed Kadhim Hassan

Pages: 103-107

PDF Full Text
Abstract

Although the advanced technology in satellites and optical fiber communication systems exists now a day, but the researches in HF sky wave propagation for Mesopotamia (Iraq) area is suffered from shortage. In this paper, the novelty is that the communication path from Baghdad to any distance out of Iraqi border had been predicted, calculated and measured experimentally by using real data (Ionogram) supplemented by Nicosia Ionosound station 1000Km from Baghdad and a radio station model TS-130SE as a transmitter. The Predicted results generated by using MATLAB and NTIA/ITS software package like VOACAP. Radio communication using TS-130SE with 36 countries had been done experimentally. A comparison between the theoretical and experimental results was done. The experimental results were in the range of the predicated results which emphasis proposed method Presented in this paper .

Article
Partial Encryption of Compressed Image Using Threshold Quantization and AES Cipher

Hameed A. Younis, Abdulkareem Y. Abdalla, Turki Y. Abdalla

Pages: 1-11

PDF Full Text
Abstract

Cryptography is one of the technological means to provide security to data being transmitted on information and communication systems. When it is necessary to securely transmit data in limited bandwidth, both compression and encryption must be performed. Researchers have combined compression and encryption together to reduce the overall processing time. In this paper, new partial encryption schemes are proposed to encrypt only part of the compressed image. Soft and hard threshold compression methods are used in the compression step and the Advanced Encryption Standard (AES) cipher is used for the encryption step. The effect of different threshold values on the performance of the proposed schemes are studied. The proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of the underlying selected compression methods.

Article
A Secure Image Cryptographic Algorithm Based on Triple Incorporated Ciphering Stages

Sura F. Yousif, Abbas Salman Hameed, Dheyaa T. Al-Zuhairi

Pages: 1-21

PDF Full Text
Abstract

Lately, image encryption has stand out as a highly urgent demand to provide high security for digital images against use and unauthorized distribution. A lot of existing researches use chaotic systems, symmetric or asymmetric schemes for image encryption, but cryptosystem based on one encryption technique only, faces many challenges like weak security and low complexity. Therefore, incorporating two or more different ciphering methods yields a secure and efficient algorithm to protect image information. In this work, a new image cryptosystem is suggested by joining zigzag scan technique, RSA algorithm and chaotic systems. These three security factors introduce Triple Incorporated Ciphering stages system (TIC). Initially, the plaintext image is divided into 8 × 8 non-overlapping blocks, then the odd blocks are isolated from the even blocks. After that, a new modified zigzag scan in two different directions is adopted for shuffling pixels in the odd and even blocks. This operation effectively enhances the shuffling degree. Next, the RSA algorithm is utilized after combining the scrambled blocks in one matrix. Finally, chaotic systems are implemented on the resultant encrypted matrix to complete the ciphering process. The chaos is implemented in two steps; confusion and diffusion. Duffing map is exploited in the confusion stage, whereas L¨u system is adopted on the shuffled matrix in the diffusion stage. The simulation results show the superiority of TIC in both security and attacks robustness compared to other cryptographic algorithms. Therefore, TIC can be exploited in real-time communication systems for secure image transmission.

Article
Effect of System Impairment on the Performance of a Polarization Shift Keying Coherent Detection System Incorporating Jones Matrix Inversion Technique

R. S. Fyath, M. T. Rashid

Pages: 122-137

PDF Full Text
Abstract

Recently, Jones matrix parameter shift keying (JMPSK) technique has been proposed in the literature to achieve phase noise and polarization state insensitive optical communication systems. The aim of this paper is to examine the performance of this system in the presence of system impairments, namely channel dichroism. A comprehensive analysis is presented to assess the effect of dichroism on the bit-error-rate (BER) characteristics of JMPSK receiver.

Article
An Assessment of Ensemble Voting Approaches, Random Forest, and Decision Tree Techniques in Detecting Distributed Denial of Service (DDoS) Attacks

Mustafa S. Ibrahim Alsumaidaie, Khattab M. Ali Alheeti, Abdul Kareem Alaloosy

Pages: 16-24

PDF Full Text
Abstract

The reliance on networks and systems has grown rapidly in contemporary times, leading to increased vulnerability to cyber assaults. The Distributed Denial-of-Service (Distributed Denial of Service) attack, a threat that can cause great financial liabilities and reputation damage. To address this problem, Machine Learning (ML) algorithms have gained huge attention, enabling the detection and prevention of DDOS (Distributed Denial of Service) Attacks. In this study, we proposed a novel security mechanism to avoid Distributed Denial of Service attacks. Using an ensemble learning methodology aims to it also can differentiate between normal network traffic and the malicious flood of Distributed Denial of Service attack traffic. The study also evaluates the performance of two well-known ML algorithms, namely, the decision tree and random forest, which were used to execute the proposed method. Tree in defending against Distributed Denial of Service (DDoS) attacks. We test the models using a publicly available dataset called TIME SERIES DATASET FOR DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION. We compare the performance of models using a list of evaluation metrics developing the Model. This step involves fetching the data, preprocessing it, and splitting it into training and testing subgroups, model selection, and validation. When applied to a database of nearly 11,000 time series; in some cases, the proposed approach manifested promising results and reached an Accuracy (ACC) of up to 100 % in the dataset. Ultimately, this proposed method detects and mitigates distributed denial of service. The solution to securing communication systems from this increasing cyber threat is this: preventing attacks from being successful.

1 - 9 of 9 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.