Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
(( Technology's role Time driver Activity-based costing at Provide of information for economic units for customer profitability analysis ))
...Show More Authors

  The economic units always sought to maintain its market position and Trchinh the technology management and modern methods that will support success factors .vdila about it has become a customer and one profitability analysis of the most practical way benefit of economic units as modern management focus their attention on achieving this satisfaction, as the customers make up the axis of the success of every organization and that there are many government units aiming to profit directs attention to customers and the number of these units increased continuously. The administration used the customer profitability analysis in order to obtain information to assist in making and decision-making process. How to use modern tec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2011
Journal Name
The Iraqi J. Agric. Sci.
THE RELATIVE CONSTANT TO ESTIMATE ̅ 2 OF 3–WAY AND DOUBLE CROSSES OF MAIZE
...Show More Authors

A field experiment was conducted at the field of the Dept. of Field Crop Sci. / College of Agriculture / University of Baghdad . The objective was to determine the values of relative constant of three – way and double crosses of maize . Ten inbreds were used and crossed during spring and fall seasons of 2009 to produce three - way and double crosses , and ten hybrids were taken from each group . The ten hybrids were grown and selfed during spring 2010 to produce 2 seed . Three way and double crosses were sown with their parents and 2 seed during fall 2010 in RCBD with four replicates . Leaf area , total dry matter , row/ear , grain/ear , grain weight and grain weight/plant of hybrids , parents and 2 plants were taken . Results showed that

... Show More
Publication Date
Wed Jun 24 2015
Journal Name
Chinese Journal Of Biomedical Engineering
Single Channel Fetal ECG Detection Using LMS and RLS Adaptive Filters
...Show More Authors

ECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Performance of STBC Based MIMO-OFDM Using Pilot-aided Channel Estimation
...Show More Authors

Many studies have been published to address the growing issues in wireless communication systems. Space-Time Block Coding (STBC) is an effective and practical MIMO-OFDM application that can address such issues. It is a powerful tool for increasing wireless performance by coding data symbols and transmitting diversity using several antennas. The most significant challenge is to recover the transmitted signal through a time-varying multipath fading channel and obtain a precise channel estimation to recover the transmitted information symbols. This work considers different pilot patterns for channel estimation and equalization in MIMO-OFDM systems. The pilot patterns fall under two general types: comb and block types, with

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
Conjugate Heat Transfer of Laminar Air Flow in Rectangular Mini Channel
...Show More Authors

Conjugate heat transfer has significant implications on heat transfer characteristics, particularly in thick wall applications and small diameter pipes. In this study, a three-dimensional numerical investigation was carried out using commercial CFD software “ANSYS FLUENT” to study the influence of conjugate heat transfer of laminar flow in mini channels at constant heat flux wall conditions. Two parameters were studied and analyzed: the wall thickness and thermal conductivity and their effect on heat transfer characteristics such as temperature profile and Nusselt number. Thermal conductivity of (0.25, 10, 202, and 387) W/m2C and wall thickness of (1, 5, and 50) mm were used for a channel of (1*2) mm cross

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Wireless channel-based ciphering key generation: effect of aging and treatment
...Show More Authors

Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Utilization of Glycerol for Glycerol Carbonate Synthesis via Transesterfication Reaction over Bio-Char Catalyst prepared from reed plant
...Show More Authors

Biodiesel production process was attracted more attention recently due to the surplus quantity of glycerol (G) as a byproduct from the process. Glycerol Utilization must take in to consideration to fix this issue also, to ensure biodiesel industry sustainability. Highly amount of Glycerol converted to more benefit material Glycerol carbonate (GC) was one of the most allurement compound derived from glycerol by transesterification of glycerol with dimethyl carbonate (DMC). Various parameters have highly impact on transesterification was investigated like catalyst loading (1-5) %wt., molar ratio of DMC: glycerol (5:1 – 1:1), reaction time (30 - 150) min and temperature (40 – 80) ᴼC. The Optimum glycerol carbonate yie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref