Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Dialectic of the Living Body (the actor) and the Dead Body (the Sinography Item) in the Construction of the Staged Image of the Play: جاسم كاظم عبد - عماد هادي عباس
...Show More Authors

The current research deals with the dialectical relationship resulting from the conflict in the violent combination and construction of the living ( the actor)and the dead (the item) in the structure of the Sinography construction and the emergence of the theatrical play space , which can be summed up by the following question: what is the nature of the dialectical relationship between the living (the actor) and the dead( the item) in the Sinography creation, which limited the research in a central objective : to identify the controversy of the living (actor) and the dead (item) in the performance unit of the theatrical scene . The research, in its objective limits set forth in its methodological framework, analyzes this controversy in o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Prevalence and Demographic Characteristics of Metabolic Syndrome in Iraqi Patients with Acute Coronary Syndrome
...Show More Authors

خلفية البحث: المتلازمة الأيضية عند المرضى العراقيين المصابين بالمتلازمة التاجية الحادة قليلا ما تمت دراستها. الأهداف: دراسة الخصائص المجتمعية-السكانية للمرضى العراقيين المصابين  بالمتلازمة الايضية مع المتلازمة التاجية الحادة. المرضى وطرق العمل:  شملت الدراسة المقطعية 150 مصابا بالمتلازمة التاجية الحادة الذين يعالجون في وحده العناية القلبية في مستشفى اليرموك التعليمي في بغداد للفترة من منتصف كانون الث

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sun Jul 28 2024
Journal Name
Lecture Notes In Networks And Systems
The Effect of the Audit Value on the Value Relevance of Accounting Information for Economic Units
...Show More Authors

Abstract The study aims to clarify the value of auditing economic units and how it can be measured, which is one of the most important challenges to matching the Value Relevance of Accounting Information. The problem of the study was identified with questions that revolve around the extent to which it is possible to measure the value of auditing in Iraqi economic units and the extent to which the value of auditing affects the adequacy of accounting information. Through reviewing the studies discussing this topic, it was found that auditing can provide value through the performance of the auditor and adding value to the economic unit subject to audit. The study recommended the need to study the situational factors of auditing, whether exter

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 17 2022
Journal Name
International Journal Of Health Sciences
Molecular detection of biofilm coding genes in Staphylococcus aureus
...Show More Authors

In accordance with epidemic COVID-19, the elevated infection rates, disinfectant overuse and antibiotic misuse what led to immune suppression in most of the population in addition to genotypic and phenotypic alterations in the microorganisms, so a great need to reevaluate the genetic determinants that responsible for bacterial community (biofilm) has been raised. A total of 250 clinical specimens were obtained from patients in Baghdad hospitals and streaked on Mannitol salt agar medium. The results revealed that 156 isolates appeared as round yellow colonies, indicating that they were mostly identified as Staphylococcus aureus from 250 specimens. The antibiotic resistance pattern of the isolates for methicillin 37.17% (n=58), Amoxic

... Show More
View Publication
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 02 2011
Journal Name
Ibn Al-haithem Journal For Pure And Applied Sciences
On modified pr-test double stage shrinkage estimators for estimate the parameters of simple linear regression model
...Show More Authors

Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Pre-Test Single and Double Stage Shrunken Estimators for the Mean of Normal Distribution with Known Variance
...Show More Authors

This paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (47)
Crossref (40)
Scopus Clarivate Crossref