Preferred Language
Articles
/
4xdoUpEBVTCNdQwCi5TM
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed for protecting information integrity when data is being transferred over a harsh communication medium. Hence, a separate channel coding protocol is often

Scopus Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Comparing Weibull Stress – Strength Reliability Bayesian Estimators for Singly Type II Censored Data under Different loss Functions
...Show More Authors

     The stress(Y) – strength(X) model reliability Bayesian estimation which defines life of a component with strength X and stress Y (the component fails if and only if at any time the applied stress is greater than its strength) has been studied, then the reliability; R=P(Y<X), can be considered as a measure of the component performance. In this paper, a Bayesian analysis has been considered for R when the two variables X and Y are independent Weibull random variables with common parameter α in order to study the effect of each of the two different scale parameters β and λ; respectively, using three different [weighted, quadratic and entropy] loss functions under two different prior functions [Gamma and extension of Jeffery

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
Al-kindy College Medical Journal
Inguinal hernia repair under local anaesthesia
...Show More Authors

Background: For various reasons, inguinal hernia repair under local anaesthesia is not well accepted to both patients and surgeons. The patients fear from pain and surgeons need full relaxation and co-operation to do successful hernia repairMethods: purpose of this study is to evaluate the effectiveness of local anaesthesia in inguinal hernia repair.prospective study was made from January 2011-0ctober 2013 , on a total of 50 patients with inguinal hernia operated on under local anaesthesia. Patients were selected primarily on the basis of their willingness to accept the procedure after the technique was described to them.Results: In this study 50 patient and 58 herniorrhaphies done for them during a period of about 34months were evaluate

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Agricultural And Statistical Sciences
Production of potato under soilless culture
...Show More Authors

Scopus (7)
Scopus
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Grammatical terminology under the criticism microscope
...Show More Authors

this research five grammatical terminology, and predicate and ascribed to it and added and genitive, examined scientific accuracy envisaged in placed and how they conform to the content then proposed five alternative terminology, and proved that this alternative terminology reflects more accurately the content of conventional terminology in Arabic grammar lesson, logical approach relies on analysis of morphological derivation of the term and its language, and recommended research to pursue critical studies in grammatical terminology, because such research has Significant impact in removing the grammatical ambiguity of some scholars, as well as instrumental in the development of methods of teaching Arabic grammar, to return to the relatio

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
US-Iranian relations under President Obama
...Show More Authors

تنتاب العلاقةَ الأمريكية الإيرانية تجاذباتٌ ومشاحنات أدخلت العالم في حالة من الغموض السياسي، وجعلت بعض المراقبين والمحللين السياسيين لا يستبعدون توجيه الولايات المتحدة الأمريكية أو إسرائيل ضربة عسكرية لإيران، إذ يرى المدقق في واقع تلك العلاقة المضطربة: أن الأمور كلما بلغت حافة الهاوية عادت من جديد إلى ساحة الحوار والمفاوضات، ويبدو: أن الإستراتيجية الأمريكية التي يتبعها الرئيس (باراك أو

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Woman Under Virtual Reality Environment
...Show More Authors

Virtual reality technology is the science of the embodiment of things and move spontaneously among non-real from one place to another with the full sense of the form, touch, sound, enables the user tried out and deal with it, like a real natural world and open up new worlds for human ambitious to let him overlooks the supposed world. Internet has become part of our daily lives, especially with the presence of mobile devices; that revolutionized the world of social networking. Access to information and build relationships change in the era of digital technology. The woman is not in isolation from this era; she found to herself a wide area for the production of ideas.
When we talk about woman in the modern means of communication, this a

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Carbon-13 Characterization and Modelling for Temperature Measurement-Based Proton Frequency
...Show More Authors

The physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wi

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
2018 2nd International Conference On Imaging, Signal Processing And Communication (icispc)
Analogy-based Common-Sense Knowledge for Opinion-Target Identification and Aggregation
...Show More Authors

The development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sun Aug 06 2023
Journal Name
Journal Of Economics And Administrative Sciences
Probit and Improved Probit Transform-Based Kernel Estimator for Copula Density
...Show More Authors

Copula modeling is widely used in modern statistics. The boundary bias problem is one of the problems faced when estimating by nonparametric methods, as kernel estimators are the most common in nonparametric estimation. In this paper, the copula density function was estimated using the probit transformation nonparametric method in order to get rid of the boundary bias problem that the kernel estimators suffer from. Using simulation for three nonparametric methods to estimate the copula density function and we proposed a new method that is better than the rest of the methods by five types of copulas with different sample sizes and different levels of correlation between the copula variables and the different parameters for the function. The

... Show More