Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The use of value chain analysis of information in determining the most important the accounting information
...Show More Authors

The use  analysis  value chain such  information in the provision as financial  so information quality meet and satisfy the needs of users such information , particularly investors and lenders   as the identification needs   financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances   theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamics of Double Chaos
...Show More Authors

stract         This paper includes studying (dynamic of double chaos) in two steps: First Step:- Applying ordinary differential equation have behaved chaotically such as (Duffing's equation) on (double pendulum) equation system to get new system of ordinary differential equations depend on it next step. Second Step:- We demonstrate existence of a dynamics of double chaos in Duffing's equation by relying on graphical result of Poincare's map from numerical simulation.

View Publication Preview PDF
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
Mathematical Model For Determination the Increase in Operational Cost of Transmission Line From HAD3 to QIM3 in Electric Power System
...Show More Authors

The transformation of a physical system to mathematical base is very important due to analysis of the systems behavior. In this paper an electric power system is considered, we design mathematical model for the determination of the increase in operational cost of transmission line from Haditha Dam substation to Qa'im substation . We derived relations which the approximate distance for VARS transmission must satisfy with considering minimum losses in the system. MATLAB computer programming is used to obtain the numerical results. The developed mathematical model and the numerical results could be useful to electric power systems engineers

View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Rosiglitazone , Metformin or both for Treatment of Polycystic Ovary Syndrome
...Show More Authors

         This study was designed to show the advantages of using the combination of metformin and rosiglitazone over using each drug alone in treatment of women with polycystic ovary syndrome (PCOS).Forty four women with PCOS were classified into 3 groups , group 1 received rosiglitazone (4mg/day) for 3 months , group ΙΙ received metformin ( 1500 mg/day)for three months and groupΙΙΙ received the combination ( rosiglitazone 4mg/day + metformin 1500 mg/day) for the same period of treatment   . The blood samples were drawn before treatment and after 3 months of treatment . The fasting serum glucose , insulin , progesterone , testosterone , leutinizing hormone were measure

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Peristaltic Flow of the Bingham Plastic Fluid in a Curved Channel
...Show More Authors

    In this paper, we study the peristaltic transport of incompressible Bingham plastic fluid in a curved channel. The formulation of the problem is presented through, the regular perturbation technique for small values of  is used to find the final expression of stream function. The numerical solution of pressure rise per wave length is obtained through numerical integration because its analytical solution is impossible. Also the trapping phenomenon is analyzed. The effect of the variation of the physical parameters of the problem are discussed and illustrated graphically.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Measuring university teachers attitudes towards the security man
...Show More Authors

Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Randomand and social security
...Show More Authors

The problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in c

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF