--->Communications and Signal Processing

8 Items
  • An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment

    Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, Binod Kumar Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush
    Abstract views : 101 | PDF downloads : 49

    153-158


    DOI: https://doi.org/10.25130/tjes.30.4.16
  • Blind and Non-Blind Deconvolution-Based Image Deblurring Techniques for Blurred and Noisy Image

    Shayma Wail Nourildean
    Abstract views : 93 | PDF downloads : 65

    12-22


    DOI: https://doi.org/10.25130/tjes.31.1.2
  • Energy-Efficient Massive MIMO Network

    Israa Hilme Ahmed, Ayad Atiyah Abdulkafi
    Abstract views : 405 | PDF downloads : 275

    1-8


    DOI: https://doi.org/10.25130/tjes.30.3.1
  • Identifying a Suitable Signal Processing Technique for MI EEG Data

    Ali Al-Saegh
    Abstract views : 118 | PDF downloads : 59

    140-147


    DOI: https://doi.org/10.25130/tjes.30.3.14
  • New Algorithm for Real-Valued Fourier Transform

    Sukaina K. Salih, Mounir T. Hamood
    Abstract views : 54 | PDF downloads : 27

    127-133


    DOI: https://doi.org/10.25130/tjes.30.4.13
  • Optimizing Data Security with Hybrid Scheme Based on LSB and DWT

    Sarah Faeq Abdullah, Shahir Fleyeh Nawaf
    Abstract views : 96 | PDF downloads : 46

    190-199


    DOI: https://doi.org/10.25130/tjes.30.3.17
  • Performance Analysis of Cooperative NOMA for Different Power Allocation Strategies

    Shatha Hellan Saeed, Ibrahim Khalil Sileh
    Abstract views : 61 | PDF downloads : 40

    102-117


    DOI: https://doi.org/10.25130/tjes.30.4.11
  • Performance Enhancement of LDPC Codes Based on Protograph Construction in 5G-NR Standard

    Aymen M. Al-Kadhimi, Ammar E. Abdulkareem, Charalampos C. Tsimenidis
    Abstract views : 326 | PDF downloads : 256

    1-10


    DOI: https://doi.org/10.25130/tjes.30.4.1