Preferred Language
Articles
/
ijs-801
Quantum Key Distribution and Chaos Bandwidth Effects on Impact Security of Quantum Communications
...Show More Authors

The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors

View Publication
Scopus (292)
Crossref (259)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
Mass Media Communications Misdirecting in Broadcasting Information
...Show More Authors

The current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multiple activities in the field of media and is far away from the effects imposed by the media institutions on employees with respect to the adoption of the institution policy, its agenda, and the trends financing it. The current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multipl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 13 2020
Journal Name
Journal Of Physics: Conference Series
Chaos in Beddington–DeAngelis food chain model with fear
...Show More Authors
Abstract<p>In the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used t</p> ... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Entrepreneur Decision Making on Ambidexterity Performance: An Applied Research in the Oil Products Distribution Company/ aldawra
...Show More Authors

 

The research aims to determine the role of Entrepreneur decision-making in its dimensions in improving the activities of Ambidexterity performance in its dimensions in the researched company. The importance of the research is also evidenced by assisting the oil products distribution company/session in directing the interest of the researched company because it has a prominent role in the Iraqi industrial community for the Entrepreneur decision-making variable that Contributes to building sustainable competitive advantage. This will happen when the company has an Entrepreneur orientation and a good strategic plan is built by the smart leaders in the researched company The researcher adopted the method of the analyti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of brand identity in achieving marketing objectives Applied Study in the International Company for smart card "Key Card"
...Show More Authors

Each organization has values ​​and objectives, tangible and intangible properties of its products. The reflection of properties on the brand constitutes the identity of the brand that contributes to building the customer's convictions about the products or services provided by any organization and its brand in a positive or negative way. This is reflected in purchasing behavior, which may push forward the progress towards marketing goals or deviation from them. Therefore, the current research came to identify the brand identity, its types and the factors affecting them and how they affect to achieve each of the marketing goals. At a time when

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 23 2021
Journal Name
International Journal Of Energy Research
Localized heating element distribution in composite metal foam‐phase change material: Fourier's law and creeping flow effects
...Show More Authors

View Publication
Scopus (29)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref