Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
Irritable Bowel Syndrome: The Most Common Presentation, Severity Ranking and Therapeutic Regimens among Patients Attending Outpatient
...Show More Authors

Background: Irritable bowel syndrome (IBS) is one of the most common GI disorders in people under 50 years of age.
Objective: To Formulate an overview about demographics of IBS and patterns of presentation, to determine IBS patients severity ranking, and to recognize the main regimens with their patient satisfaction.
Methods: This is a cross sectional clinical study that is conducted in Outpatient Consultant Internal Medicine Clinic in Al-Kindy Teaching Hospital from 11/12/2017 to 24/12/2017. The patients suffering from IBS are diagnosed by a consultant according to the symptom-based Rome criteria for functional GI disorders, by implementing a questionnaire collecting thorough information. 77 cases of IBS patients were collected (2

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
American hegemony over the Persian Gulf oil After the 1991 Gulf War and the Gulf War III in 2003
...Show More Authors

Since the end of World War II, the United States of America began to look at the Gulf States and Iraq due to the possession of huge quantities of oil, after taking the American oil depletion in order to tighten control over the oil of these countries, has pursued various means, political and military, in the framework of its strategy So that it could achieve this control, which focused on control of production and prices, for the conviction that those who control oil impose control over the political decision of the countries of the world.

View Publication Preview PDF
Crossref
Publication Date
Thu May 06 2010
Journal Name
Dirasat, Pure Sciences
A Study of the Effects of the Solar Cycle 22, on the Critical Frequencies of F1 Layer over Baghdad
...Show More Authors

This paper aims to study the effects of the long term solar activity on the critical frequencies of ionospheric F1 layer over Baghdad city, during the solar cycle 22, within (1988- 1995). It is found that the critical frequency of this layer is closely related to the sunspots number during the years of the solar cycle 22, at a middle latitude region of the world. The study discussed the effect of sunspot numbers and solar events on the electron densities of F1 layer, which is the most important ionospheric parameter.

Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
A Comparison Between Recursive Least-Squares (RLS) and Extended Recursive Least-Squares (E-RLS) for Tracking Multiple Fast Time Variation Rayleigh Fading Channel
...Show More Authors

In order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.

View Publication Preview PDF
Publication Date
Fri Dec 23 2022
Journal Name
F1000research
Association between polymorphisms within the gene coding for tumor necrosis factor (TNF)-alpha with outcomes of treatment in a sample of Iraqi patients with ankylosing spondylitis taking etanercept: an observational study
...Show More Authors

Background:Ankylosing spondylitis (AS) is a progressive, chronic inflammatory illness with an unclear etiology that explicitly targets the vertebral column, peripheral joints, and extraarticular tissues. The purpose of this research was to investigate if the existence of single nucleotide polymorphisms (SNPs) in the promoter region of the tumor necrosis factor-alpha (TNF-α) gene at positions -1031T/C (rs199964), -857C/T (rs1799724) and -806C/T (rs4248158) in a sample of Iraqi AS patients could influence the patients' outcomes with etanercept.

Methods:Sixty patients with established AS receiving only etanercept were selected to enroll in this study, with a mean age of 40.75±8.6

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
OPTIMAL DESIGN OF MODERATE THICK LAMINATED COMPOSITE PLATES UNDER STATIC CONSTRAINTS USING REAL CODING GENETIC ALGORITHM
...Show More Authors

The objective of the current research is to find an optimum design of hybrid laminated moderate thick composite plates with static constraint. The stacking sequence and ply angle is required for optimization to achieve minimum deflection for hybrid laminated composite plates consist of glass and carbon long fibers reinforcements that impeded in epoxy matrix with known plates dimension and loading. The analysis of plate is by adopting the first-order shear deformation theory and using Navier's solution with Genetic Algorithm to approach the current objective. A program written with MATLAB to find best stacking sequence and ply angles that give minimum deflection, and the results comparing with ANSYS.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
Prevalence of clinically significant Hepatopulmonary Syndrome among Patients with Chronic Liver Disease and Portal Hypertension
...Show More Authors

Background : The hepatopulmonary syndrome (HPS) is defined as the triad of liver disease, arterial deoxygenation, and pulmonary vascular dilatation. The reported prevalence of HPS in cirrhotic patients varies between 5% -17.5%.Objective : To estimate the prevalence of hepatopulmonary syndrome among patients with chronic liver disease and portal hypertension and to study the correlation between HPS and the severity of liver disease.Patients and methods : Thirty patients were studied for the presence of HPS using transthoracic contrast echocardiography for detection of pulmonary vasodilatation. Arterial oxygen saturation (SaO2) was determined in erect and supine position using a pulse oximeter , (SaO2 ≤ 92 % in supine position and/or a d

... Show More
View Publication Preview PDF