Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Engineering Research And Management
The first and Second Order Polynomial Models with Double Scalar Quantization for Image Compression
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Image And Video Technology: 8th Pacific-rim Symposium
A New Scheme for QoE Management of Live Video Streaming in Cloud Environment
...Show More Authors

Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Rosiglitazone , Metformin or both for Treatment of Polycystic Ovary Syndrome
...Show More Authors

         This study was designed to show the advantages of using the combination of metformin and rosiglitazone over using each drug alone in treatment of women with polycystic ovary syndrome (PCOS).Forty four women with PCOS were classified into 3 groups , group 1 received rosiglitazone (4mg/day) for 3 months , group ΙΙ received metformin ( 1500 mg/day)for three months and groupΙΙΙ received the combination ( rosiglitazone 4mg/day + metformin 1500 mg/day) for the same period of treatment   . The blood samples were drawn before treatment and after 3 months of treatment . The fasting serum glucose , insulin , progesterone , testosterone , leutinizing hormone were measure

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Reliability Analysis of Multibit Error Correcting Coding and Comparison to Hamming Product Code for On-Chip Interconnect
...Show More Authors

Error control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Attitudes of mothers towards over the counter antibiotics for their children in Baghdad city
...Show More Authors

Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors