scispace - formally typeset
Search or ask a question
Author

Abdulkareem Abdulrahman Kadhim

Bio: Abdulkareem Abdulrahman Kadhim is an academic researcher from Nahrain University. The author has contributed to research in topics: Computer science & Polar code. The author has an hindex of 4, co-authored 23 publications receiving 64 citations. Previous affiliations of Abdulkareem Abdulrahman Kadhim include Al-Ahliyya Amman University & Loughborough University.

Papers
More filters
Proceedings ArticleDOI
01 Sep 2018
TL;DR: Looking into 5G requirements for channel coding and candidate channel coding schemes for 5G, it seems that polar code with Successive Cancellation List (SCL) decoding using small list length is a promising choice for short message lengths due to its error performance and relatively low complexity.
Abstract: In this paper we look into 5G requirements for channel coding and review candidate channel coding schemes for 5G. A comparative study is presented for possible channel coding candidates of 5G covering Convolutional, Turbo, Low Density Parity Check (LDPC), and Polar codes. It seems that polar code with Successive Cancellation List (SCL) decoding using small list length (such as 8) is a promising choice for short message lengths (≤128 bits) due to its error performance and relatively low complexity. Also adopting non-binary LDPC can provide good performance on the expense of increased complexity but with better spectral efficiency. Considering the implementation, polar code with decoding algorithms based on SCL required small area and low power consumption when compared to LDPC codes. For larger message lengths (≥256 bits) turbo code can provide better performance at low coding rates (<1/2)

17 citations

01 Jan 2012
TL;DR: A speaker recognition system for 6304 speech samples is presented that relies on LPC -derived features and two different modes are considered in identifying individuals according to their speech samples, finding that all tested LPC-derived features outperform the raw LPC coefficients.
Abstract: Humans are integrated closer to computers every day, and computers are taking over many services that used to be based on fac e-to- face contact between humans. Thishas prompted an active development in the field of biometric systems. The use of biometric information has been known widely for both person identification and security applications. The paper is concerned with the use of speaker fe atures for protection against unauthorized access. A speaker recognition system for 6304 speech samples is presented that relies on LPC -derived features. A vocabulary of 46 speech samples is built for 10 speakers, where each authorized person is asked to utter every sample 10 ti mes. Two different modes are considered in identifying individuals according to their speech samples. In the closed -set speaker identification, it is found that all tested LPC-derived features outperform the raw LPC coefficients and 84% to 97% identificati on rates are achieved. Applying the preprocessing steps to the speech signals (preemphasis, remove DC offset, frame blocking, overlapping, normalization and windowing) improve the representation of speech features, and up to 100% identification rate was ob tained using weighted Linear Predictive Cepstral Coefficients (LPCC). In the open-set speaker verification mode of our proposed system model, the system selects randomly a pass phrase of 8 -samples length from its database for each trial a speaker is presen ted to the system. Up to 213 text-prompt trials from 23-different speakers (authorized and unauthorized) are recorded (i.e., 1704 samples) in order to study the system behavior and to generate the optimal threshold i n which the speakers are verified or not when compared to those training references of authorized speakers constructed in the first mode, where the best obtained speaker verification rate is greater than 99%.

11 citations

Proceedings ArticleDOI
16 Sep 2008
TL;DR: The proposed scheme suggests the insertion of pilot bits in the data sequence in such a manner that low weight codewords are eliminated or their weight multiplicity being reduced, in this way, pilots are utilized to increase the minimum distance of the code effectively.
Abstract: In this paper we present a simple modification of a classical turbo code allowing for improved distance properties and rate adaptation. The proposed scheme suggests the insertion of pilot bits in the data sequence in such a manner that low weight codewords are eliminated or their weight multiplicity being reduced. In this way, pilots are utilized to increase the minimum distance of the code effectively. Furthermore, the rate can be made adaptive, almost arbitrarily according to the channel conditions under fixed interleaver length constraint. The resulting code uses fixed length codeword, can support a wide range of rates and even outperform the original system that uses external pilot insertion, in terms of error performance specifically at high signal to noise ratio. The proposed scheme does not add any complexity to the encoder neither to the decoder. Two recursive systematic convolutional (RSC) encoders together with S-random interleaver are used at the encoder side. At the decoder, soft-input soft-output Viterbi algorithm (SOVA) to accomplish iterative decoding with a maximum of five iterations is used.

10 citations

Proceedings ArticleDOI
06 Dec 2011
TL;DR: The throughput of the network coded system as compared to the case where coding is not used have shown an increase in throughput on the expense of slight increase in packets overhead.
Abstract: In traditional IP based networks, the nodes operate as store-and-forward of packets that are convoyed from source to destination. With network coding, intermediate nodes usually linearly encode packet's content and then send out packets that are linear combinations of previously received information. The present research gives an overview of network coding structure, benefits and challenges. A simple arrangement is proposed to implement and evaluate the performance of some network models using network coding. In the present work a packet based network coding rather than symbol based coding, is used. The throughput of the network coded system as compared to the case where coding is not used have shown an increase in throughput on the expense of slight increase in packets overhead. The coding gains in throughput obtained by network coding for the networks considered in the work are closed to the theoretical ones, limited by max-flow min-cut theorem, by about 3% over the same network without coding.

5 citations

Proceedings ArticleDOI
25 Nov 2008
TL;DR: Improvement has been achieved in robustness on the expense of reducing the capacity of hiding and the performance of the proposed stegosystem has shown good immunity to moderate levels of channel noise and lossy compression ratios.
Abstract: Steganography is the art and science of hiding that a communication is taken place. It embeds the secret file (text, audio or image) in other carrier file. Text in image steganography is considered in this work. The proposed stegosystem uses Spread Spectrum technique which is applied in spatial domain together with error correction coding. These are used to increase the security and robustness of the system. Random location selection within the cover image pixels is also proposed in the work. Improvement has been achieved in robustness on the expense of reducing the capacity of hiding. The imperceptibility of the stego image is assessed by using peak signal-to-noise ratio (PSNR) measure. Attacks in the form of lossy compression and additive noise are considered. The performance of the proposed system has shown good immunity to moderate levels of channel noise and lossy compression ratios.

3 citations


Cited by
More filters
Patent
17 Jun 2011
TL;DR: In this paper, the authors propose a method of iterative multi-layer decoding of a multimedia communication signal, wherein persistent bits from various upper layers of the employed protocol stack are used in error correction decoding at a lower error-correction layer.
Abstract: The invention relates to a method of iterative multi-layer decoding of a multimedia communication signal, wherein persistent bits from various upper layers of the employed protocol stack are used in error correction decoding at a lower error-correction layer. The method includes saving persistent bits from successfully decoded FEC frames in memory, and using a subset of the saved bits in decoding of future frames. A smart controller is used to analyze frames for the presence and location of persistent bits, for saving thereof in memory, and for inserting saved persistent bits into a next frame at successive decoding iterations thereof.

45 citations

Journal ArticleDOI
M. Geetha1, R. Ganesan1
TL;DR: The main aim of this investigation is to propose a novel protocol Cooperative Energy efficient and Priority based Reliable routing protocol with Network coding (CEPRAN) to enhance the reliability and energy efficiency of WBAN using cooperative communication method.
Abstract: The wireless body area network (WBAN) can effectively modify the health and lifestyle monitoring specifically where multiple body parameters are measured using biomedical sensor devices. However, power consumption and reliability are crucial issues in WBAN. Cooperative Communication usually prolongs the network lifetime of WBAN and allows reliable delivery of bio-medical packets. Hence, the main aim of this investigation is to propose a novel protocol Cooperative Energy efficient and Priority based Reliable routing protocol with Network coding (CEPRAN) to enhance the reliability and energy efficiency of WBAN using cooperative communication method. Firstly, to identify a relay node from the group of sensor nodes for data forwarding, an enhanced Cuckoo search optimization algorithm is proposed. Secondly, Cooperative Random Linear Network Coding approach is incorporated into the relay node to improve the packet transfer rate. CEPRAN is implemented in Ns-3 simulator and the experimental results prove that the proposed protocol outperforms the existing SIMPLE Protocol.

18 citations

Proceedings ArticleDOI
03 Apr 2020
TL;DR: In 5G NR (New Radio) LDPC codes used for the data channel and control channel Polar Codes are used and high Coding gain is got for this code.
Abstract: In todays world, the demand for Mobile Internet is increasing and the Internet of Things poses a challenging requirement for 5G wireless communications. Turbo Codes and Tail Bitting Convolution Codes (TBCC) have proven to be efficient for LTE communication. But these codes have failed to satisfy the conditions defined for 5G Communications. In 5G, we require advanced error correction techniques for channel coding. To fulfill 5G communications requirements, we use LDPC and Polar codes for error correction. In 5G NR (New Radio) LDPC codes used for the data channel and control channel Polar Codes are used. We get high Coding gain for this code. It has several features such as high throughput, low power dissipation, and low latency. We describe encoding and decoding methods of LDPC and Polar Codes. They use two types of Base matrices of 5G NR for this code. Polar codes depend on channel polarization and are the first code that has achieved Shannon channel capacity. Polar codes have wide applications in Information theory. Quasi Cyclic LDPC code, Irregular Repeat-Accumulate (IRA) code, Spatially Coupled LDPC (SP-LDPC), NBLDPC-Polar Codes described. For 5G Standard this code plays an important role in Channel Coding.

15 citations

Journal ArticleDOI
22 Sep 2017
TL;DR: This paper presents a text independent speaker authentication method adapted to mobile devices, which includes the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier.
Abstract: This paper presents a text independent speaker authentication method adapted to mobile devices Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning To this end, we have excluded the need for any network communication Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments Public speech corpora were also employed to compare this implementation to existing methods Results were efficient regarding mobile resources’ consumption The overall classification performance obtained was accurate with a small number of samples Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism

13 citations