Preferred Language
Articles
/
ZULPmpoBMeyNPGM3RM4K
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Plant Archives
Survey of exotic plant species in Iraq
...Show More Authors

Scopus
Publication Date
Mon Dec 24 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY OF THE MARINE FISHES IN IRAQ
...Show More Authors

    A survey of fish species in the Iraqi marine waters was carried out for the period from November 2014 to March 2018. The list included 214 species representing 75 families.

 

     The family Carangidae dominated the marine fishes in Iraq, which was represented by 24 species, followed by Haemulidae with 11 species, and then Serranidae and Sparidae with nine species for each, while 34 families contained a single species only.

View Publication Preview PDF
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Applied Surface Science
Sol-gel derived ITO-based bi-layer and tri-layer thin film coatings for organic solar cells applications
...Show More Authors

View Publication
Scopus (22)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Physical Environment and Crowded Classes on Academic Achievement
...Show More Authors

The research problem can be summarized through focusing on the environment that surrounds students and class congestion, how these factors affect directly or indirectly the academic achievement of students, how these factors affect understanding the scientific material that the student receives in this physical environment, how classroom’s components such as seats, space With which the student can move, the number of students in the same class,  the lighting, whether natural or artificial, and is this lighting sufficient or not enough, the nature of the wall paint old or modern, is it comfortable for sight, the blackboard if it is Good or exhausted,  In addition to air-conditioning sets in summer and winter, this is on the on

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Al-farahidi's Arts
The Impact of Social Media on Customer Behavior - Survey Research for Tourism Companies in Baghdad
...Show More Authors

The current research aims to diagnose the type and level of influence of social media, whose dimensions are represented by (attitudes towards social media marketing, knowledge and use of social media, influence on the Internet and social media, following up on social media) on customer behavior in its dimensions (attracting attention, raising Interest, desire creation, customer response), and the research sought to answer questions related to the research problem by testing the main hypotheses to explore correlations and influence between the two variables, and to achieve research hypothesis tests, the field study was used, as the research sample reached (135) individuals from the director and the assistant director And marketing personnel

... Show More
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Some A Survey Study On The Role of Women in Controlling Parasites Contaminated with Vegetables.
...Show More Authors

Three hundred samples of washing water of vegetables were collected from women aged ( 15- 6o) years from different area in Baghdad governorate and its suburbs include two rural area ( Jaddria in Baghdad university and Al –Wagif in Rashdia) and two urbane area (Mansoure and Escan) . The samples were examined by precipitation method and then by staining method ( Lugols –Iodine stain) . The percentage of infection of intestinal parasites 36.3% include 15.3% for urban area and 57.3% in rural area and a significant difference was found between those groups . .The results showed also increased in the prevalence of parasitic infection in group age (15 -30) year .Also the results showed only 109 sample infected with eight specie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref