Preferred Language
Articles
/
7UIufJoBMeyNPGM3mMxC
Secure Wireless Communications in Broadcast Channels With Confidential Messages
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Apr 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Compared to wireless deployment in areas with different environmentse
...Show More Authors

<p>In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz

... Show More
View Publication
Crossref
Publication Date
Wed Feb 07 2018
Journal Name
Proceedings Of The 2018 4th International Conference On Mechatronics And Robotics Engineering
Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
Mass Media Communications Misdirecting in Broadcasting Information
...Show More Authors

The current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multiple activities in the field of media and is far away from the effects imposed by the media institutions on employees with respect to the adoption of the institution policy, its agenda, and the trends financing it. The current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multipl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 09 2023
Journal Name
Karbala International Journal Of Modern Science
Secure QR-Code Generation in Healthcare
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed May 30 2018
Journal Name
International Journal Of Computer Networks &amp; Communications
Robot Human Interface for Housekeeper Robot with Wireless Capabilities
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Hidden messages in (Pour un oui ou pour un non) of Nathalie Sarraute: Les messages cachés dans "Pour un oui ou pour un non" de Nathalie Sarraute
...Show More Authors

       The implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which  the author uses it in her play "Pour un oui ou pour un non".

Résumé

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
Military incidental messages In Andalusia until the end of the sixth century AH
...Show More Authors

The Arab literature in Andalusia was distinguished by its special nature, in addition to the distinction of its influencing rhythm in our souls, it represents the natural extension of the Arab-Islamic civilization in Morocco, that civilization that collapsed with insecurity and stability and the exit of Muslim Arabs from those countries and the defeat of Muslims, their civilization has ceased, and only remains of them witnessing For its leaders in a safe and stable life, but literature in Andalusia underwent many experiences that express the lives of Arab Muslims there, especially what distinguished the Andalusian Muslims from their many battles and conquests, but they did not suffer as their support during the fall of Andalusia and the

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Marketing communications integration and its impact on the marketing performance of a number of communications companies dimensions
...Show More Authors

The research study and analysis of the integration of marketing communications and their impact on the marketing performance of a number of telecom companies, as included in the research problem to know the role of marketing communications community in achieving sales and market share, profitability and customer satisfaction. The importance of research begins to be the right choice for the elements of marketing communications, lead to savings in time, effort and money and create a more idea about the effectiveness of the application of the concept of integration. The research to determine the role of marketing communications in promoting the integration of the marketing performance of companies in the field of sales and marke

... Show More
View Publication Preview PDF
Crossref (1)
Crossref