In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreA survey of fish species in the Iraqi marine waters was carried out for the period from November 2014 to March 2018. The list included 214 species representing 75 families.
The family Carangidae dominated the marine fishes in Iraq, which was represented by 24 species, followed by Haemulidae with 11 species, and then Serranidae and Sparidae with nine species for each, while 34 families contained a single species only.
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe research problem can be summarized through focusing on the environment that surrounds students and class congestion, how these factors affect directly or indirectly the academic achievement of students, how these factors affect understanding the scientific material that the student receives in this physical environment, how classroom’s components such as seats, space With which the student can move, the number of students in the same class, the lighting, whether natural or artificial, and is this lighting sufficient or not enough, the nature of the wall paint old or modern, is it comfortable for sight, the blackboard if it is Good or exhausted, In addition to air-conditioning sets in summer and winter, this is on the on
... Show MoreThe current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite
... Show MoreThe current research aims to diagnose the type and level of influence of social media, whose dimensions are represented by (attitudes towards social media marketing, knowledge and use of social media, influence on the Internet and social media, following up on social media) on customer behavior in its dimensions (attracting attention, raising Interest, desire creation, customer response), and the research sought to answer questions related to the research problem by testing the main hypotheses to explore correlations and influence between the two variables, and to achieve research hypothesis tests, the field study was used, as the research sample reached (135) individuals from the director and the assistant director And marketing personnel
... Show MoreThree hundred samples of washing water of vegetables were collected from women aged ( 15- 6o) years from different area in Baghdad governorate and its suburbs include two rural area ( Jaddria in Baghdad university and Al –Wagif in Rashdia) and two urbane area (Mansoure and Escan) . The samples were examined by precipitation method and then by staining method ( Lugols –Iodine stain) . The percentage of infection of intestinal parasites 36.3% include 15.3% for urban area and 57.3% in rural area and a significant difference was found between those groups . .The results showed also increased in the prevalence of parasitic infection in group age (15 -30) year .Also the results showed only 109 sample infected with eight specie
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More