Preferred Language
Articles
/
4xdoUpEBVTCNdQwCi5TM
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed for protecting information integrity when data is being transferred over a harsh communication medium. Hence, a separate channel coding protocol is often

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Proceedings Of The Conference “recent Trends In Engineering Sciences And Sustainability”, Baghdad
GNSS positioning techniques for enhancing Google Earth data quality
...Show More Authors

Due to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study

... Show More
Publication Date
Wed Jan 01 2025
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Production mechanisms and their implications for Iraqi theater techniques
...Show More Authors

Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
Intellectual property rights and its implications for the pharmaceutical industry in Iraq under accession to the World Trade Organization
...Show More Authors

The main risks arising from the WTO Agreement are the inequality and lack of competitiveness of most pharmaceutical goods, as well as the fact that Iraq is a net importer of medicines that are at the core of consumer needs, The subject matter of the Convention on the Protection of Intellectual Property Rights and its implications for the pharmaceutical industry, in particular, coinciding with the situation of financial and administrative corruption, all of which has resulted in drug fraud in the Iraqi market and its impact on public health. The control of medical technology, the persistence of the technological gap and its effects on high price levels, and the fact that domestic drug producers are obliged to obtain production licenses from

... Show More
Crossref
Publication Date
Thu Jan 06 2022
Journal Name
International Journal Of Research In Social Sciences And Humanities
Intellectual property rights and its implications for the pharmaceutical industry in Iraq under accession to the World Trade Organization
...Show More Authors

The main risks arising from the WTO Agreement are the inequality and lack of competitiveness of most pharmaceutical goods, as well as the fact that Iraq is a net importer of medicines that are at the core of consumer needs, The subject matter of the Convention on the Protection of Intellectual Property Rights and its implications for the pharmaceutical industry, in particular, coinciding with the situation of financial and administrative corruption, all of which has resulted in drug fraud in the Iraqi market and its impact on public health. The control of medical technology, the persistence of the technological gap and its effects on high price levels, and the fact that domestic drug producers are obliged to obtain production licens

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (5)
Crossref