Preferred Language
Articles
/
ZULPmpoBMeyNPGM3RM4K
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 09 2021
Journal Name
Political Sciences Journal
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Panic Attacks Over COVID 19 : A Survey Study on An Iraqi University Sample
...Show More Authors

Abstract

The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.

To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions:  physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 20 2025
Journal Name
Bulletin Of The Iraq Natural History Museum
A SURVEY OF GASTROPODS IN THE GREENHOUSES OF IRAQ
...Show More Authors

The humid and warm conditions in greenhouses provide an excellent environment for pests’ living conditions, and therefore, they provide ideal medium for alien introductions. Molluscs are among the most significant pests that infest plastic covered greenhouses. To identify and report their mollusc species, 23 greenhouses in Iraq were surveyed between March 2023 and April 2024. Of these, 11 were found to be infested with snails. A total of 158 specimens were collected and morphologically identified to seven species: Monacha obstructa (L. Pfeiffer, 1842), Eobania vermiculata (O.F. Müller, 1774), Xeropicta krynickii (Krynicki, 1833), Rumina decollata (Linnaeus, 1758), Polygyra cereolus (Megerle Von Mühlfeld, 1818), Cochlicella barba

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Emerging Trends Technology In Computer Science
A survey of similarity measures in web image search
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
The influence of CdCl2 layer and annealing process on the structural and electrical properties of CdTe films
...Show More Authors

A polycrystalline CdTefilms have been prepared by thermal evaporation technique on glass substrate at room temperature. The films thickness was about700±50 nm. Some of these films were annealed at 573 K for different duration times (60, 120 and 180 minutes), and other CdTe films followed by a layer of CdCl2 which has been deposited on them, and then the prepared CdTe films with CdCl2 layer have been annealed for the same conditions. The structures of CdTe films without and with CdCl2 layer have been investigated by X-ray diffraction. The as prepared and annealed films without and with CdCl2 layer were polycrystalline structure with preferred orientation at (111) plane. The better structural pr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref