Preferred Language
Articles
/
joe-1188
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the sequences that will be recognized for next transmissions. In 2017 Code and Phase Hopping Techniques are both proposed to resolve the most recent problem in security-related, but not with FHSS, therefore in this paper presents a new composed proposed system will progress Phase Shift and Code Hopping in Code Division Multiplexing Access (CDMA) to complement with FHSS; because the wireless Communications systems security in the last years became a nightmare for some individuals, also companies, and even countries, also join them needing for higher bits rate in the wireless channels; because of next-generation communication system 5G-6G and the evolution in social networking, IoT, stream media, IoE, visualizations, and cloud computing. The new ideas can be applicable for a large number of users, also fast implementation without synchronization, as well as without any focus on encryption or keys-exchanges, at completion all results are simulation in MATLAB R2017b, the results have been tested by using 8 users in the same time, also our results showing promises effects on security for both applied systems Phases Shift and Codes Hopping especially the Code Hopping, therefor; our results encouraged us to complete research and compare our system with other.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 18 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
supervisory authorities role in protection the financial system " conservatorship model: an applied research in Albaraka investment bank
...Show More Authors

The conservatorship is a legal action to protect troubled banks from credit risk and bankruptcy risk that banks cannot hedge them .The Central Bank role has to protect the financial system from these risks by controlling and supervising. This research studied these risks and explained the role of The Central Bank. This research presented and analyzed the legal framework for supervision and the imposition of conservatorship bank to address the effects that have been achieved as a result of poor management and weak internal controls. Baraka Bank for Investment and Finance was a research sample to measure the financial ratios for the troubled bank, and analysis the results that led to put the conservatorship. The research depends on the hyp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of internal control System in non-governmental organizations: Applied Research in the Iraqi National Olympic Committee
...Show More Authors

After 2003 Iraq witnessed a rapid development in the number and kind of non-governmental organizations in addition to the increase in their sources.A lot of obstacles and constraints hinder the development of the said organizations and one of the most important and prominent obstacles is their administrative and accounting structure that affect directly on the existence, continuity and survival of these organizations.This research discussed the concept the non-governmental organizations and reaching the assessment of internal control System in these organizations. Therefore, the researcher has assessed the internal control System applied National Olympic Committee of Iraq. The study showed vulnerabilities in the internal control the said

... Show More
View Publication
Crossref
Publication Date
Sat Oct 08 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Data Analytics and Techniques
...Show More Authors

Big data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide

... Show More
View Publication
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The added value of internal audit and its role in achieving independence and responsibility: applied research in the Rafidain State Company for Dams implementation
...Show More Authors

The added value of internal audit greatly contributes to adding value to the institution, but most departments of economic units in Iraq neglected the role of internal audit and the added value that can be achieved by those institutions, since the term added value of internal audit is a relatively vague term from the premise that what cannot be measured is difficult Determine it, and perhaps descriptive standards for it is the extent of compliance with international auditing standards (IIA).

The research aims to study the procedures and results of auditing to verify that they have given an added value to the audit with a positive impact, develop its aspects and research, identify deficiencies for the audi

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceeding Of The 1st International Conference On Advanced Research In Pure And Applied Science (icarpas2021): Third Annual Conference Of Al-muthanna University/college Of Science
Climate change and its effect on water and vegetation cover over shary region using GIS techniques
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 19 2021
Journal Name
Annals Of Telecommunications
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper
...Show More Authors

Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Jun 15 2022
Journal Name
مجلة كلية الاداب | جامعة بغداد
STRUCTURAL AND TYPOLOGICAL FEATURES OF UNITS OF THE RUSSIAN TERMINOLOGICAL SYSTEM OF THE OIL AND GAS INDUSTRY
...Show More Authors

Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Performance Improvement of the Implementation of Concrete Structures in the Construction Sector In Iraq Using The Modern Management Technique “Six Sigma”
...Show More Authors

The reality of the field of construction projects in Iraq refers to needing for the development of performance in order to improve quality and reduce defects and errors and to control the time and cost, so there is needing for the application of effective methods in this area, one of the methods that can be applied in this area is the manner of Six Sigma. This research aims to enhance the performance and quality improvement for the construction projects by improving performance in the work of the implementation of the concrete structure depending on the Six Sigma methodology, and for the purpose of achieving the aim of the research, the researcher firstly depends on the theoretical study that include the concepts of qual

... Show More
View Publication