Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Informatics (iceei)
Health Information Exchange: Current Trends, Challenges and Recommendations
...Show More Authors

View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 25 2025
Journal Name
Saudi Endodontic Journal
Insights into periapical inflammatory lesions of the jaws over 30 years in Iraq: A cross-sectional study
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
The Vertical variations of Atmospheric Methane (CH4) concentrations over selected cities in Iraq based on AIRS data
...Show More Authors

The Atmospheric Infrared Sounder (AIRS) on EOS/Aqua satellite provides diverse measurements of Methane (CH4) distribution at different pressure levels in the Earth's atmosphere. The focus of this research is to analyze the vertical variations of (CH4) volume mixing ratio (VMR) time-series data at four Standard pressure levels SPL (925, 850, 600, and 300 hPa) in the troposphere above six cities in Iraq from January 2003 to September 2016. The analysis results of monthly average CH4VMR time-series data show a significant increase between 2003 and 2016, especially from 2009 to 2016; the minimum values of CH4 were in 2003 while the maximum values were in 2016. The vertical distribution of CH4<

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of College Of Education
The Construction of Complete (k, n)-arcs in 3-Dimensional Projective Space Over Galois Field GF (4)
...Show More Authors

In this work, we construct the projectively distinct (k, n)-arcs in PG (3, 4) over Galois field GF (4), where k 5, and we found that the complete (k, n)-arcs, where 3 n 21, moreover we prove geometrically that the maximum complete (k, n)-arc in PG (3, 4) is (85, 21)-arc. A (k, n)-arcs is a set of k points no n+ 1 of which are collinear. A (k, n)-arcs is complete if it is not contained in a (k+ 1, n)-arcs

Publication Date
Thu Dec 18 2025
Journal Name
Mathematical Methods In The Applied Sciences
Time‐Dependent Term Identification in the Time–Space Fractional Derivative Diffusion Equation From Integral Over Specified Condition
...Show More Authors
ABSTRACT<p> In this paper, a time–space fractional order inverse source problem to determine the temperature solution and the time‐dependent source term from heat moment to the time–space fractional heat equation with an initial condition, homogeneous Dirichlet boundary conditions, and integral overdetermination condition is investigated. Two unconditionally stable finite difference schemes are proposed to find a numerical solution of the direct problem. Namely, method I is based on the approximation of the time‐fractional derivative via Laplace transformation, whereas method II is based on finite difference approximation. The inverse problem is solved iteratively </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Fri Aug 05 2022
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Physical-Nutritional program effect in women with Polycystic Ovary Syndrome (PCOS)
...Show More Authors

This study aimed to prepare a program (physical-nutritional) for women with polycystic ovary, as well as to identify the effect of this program on some body measurements and the incidence of polycystic ovarian syndrome in the research sample. A total of 12 women (aged 20-25 years) with Polycystic Ovary Syndrome (PCOS) participated in the randomized controlled trial design. They were divided equally into two groups (experimental and control group). The experimental group received the physical-nutritional program accompanying the treatment program, while the control group received only the instructions of the specialist doctor and the treatment program prepared by them. The two researchers applied their nutritional progr

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
نسق
Job security and its relationship to psychological tranquility in divorced teachers
...Show More Authors

A sense of job security for divorced female teachers is one of the basic and very important requirements for enjoying the mental health that a person needs in order to be positive, balanced and productive. job security is one of the important things that workers must feel not only to ensure interaction and harmony between them and officials, but to ensure their satisfaction and increasing their motivation towards work, as job security is one of the most important indicators of job satisfaction and optimism in life, and it leads to the experience of psychological reassurance, which affects the building of individuals' personalities, the development of their intellectual competence and the identification of their psychological characteristic

... Show More
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication