Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Mass Transfer Study of Oleic Acid Esterification over Prepared Nanoporous HY zeolite
...Show More Authors

A mathematical model was proposed to study the microkinetics of esterification reaction of oleic acid with ethanol over prepared HY zeolite catalyst. The catalyst was prepared from Iraqi kaolin source and its properties were characterized by different techniques. The esterification was done under different temperature (40 to 70˚C) with 6:1 for molar ratio of ethanol to oleic acid and 5 % catalyst loading.

   The microkinetics study was done over two period of time each period was examined individually to calculate the reaction rate constant and activation energy. The impact of the mass transfer resistance to the reactant was also investigated; two different studies have been accomplished to do this purpose.

&nb

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 19 2024
Journal Name
Birth
Changes in attitudes to childbirth in modern times illustrated over three generations in Iraq
...Show More Authors
Abstract<sec><title>Objective

To describe changes in attitudes and expectations of labor over the previous six decades, comparing the Iraqi generation who labored at home without medical assistance with their descendants.

Study Design

We used semi‐structured telephone interviews with 22 women across three generations of one extended family living and giving birth in Iraq between the 1950s and the 2010s. Qualitative data were analyzed thematically using open, axial, and selective coding.

Results

Each generation experienced a paradigm shift in childbirth, from exclus

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Canadian Journal Of Chemistry
Hydrogenation of pyridine and hydrogenolysis of piperidine over $γ$-Mo2N catalyst: a DFT study
...Show More Authors

Increasing demands on producing environmentally friendly products are becoming a driving force for designing highly active catalysts. Thus, surfaces that efficiently catalyse the nitrogen reduction reactions are greatly sought in moderating air-pollutant emissions. This contribution aims to computationally investigate the hydrodenitrogenation (HDN) networks of pyridine over the γ-Mo2N(111) surface using a density functional theory (DFT) approach. Various adsorption configurations have been considered for the molecularly adsorbed pyridine. Findings indicate that pyridine can be adsorbed via side-on and end-on modes in six geometries in which one adsorption site is revealed to have the lowest adsorption energy (–45.3 kcal/mol). Over a nitr

... Show More
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Bearing Capacity of Shallow Footing on Compacted Filling Dune Sand Over Reinforced Gypseous Soil
...Show More Authors

Existence of these soils, sometimes with high gypsum content, caused difficult problems to the buildings and strategic projects due to dissolution and leaching of gypsum by the action of waterflow through soil mass. In this research, a new technique is adopted to investigate the performance of replacement and geosynthetic reinforcement materials to improve the gypseous soil behavior through experimential set up manufactured loaclally specially for this work. A series of tests were carried out using steel container (600*600*500) mm. A square footing (100*100) mm was placed at the center of the top surface of the bed soil. The results showed that the most effective thickness for the dune sand layer with geotextile at the interface, within

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of a dietary education program upon hypertensive clients' information
...Show More Authors

Objective: To determine the effectiveness of a dietary educational program upon the hypertensive client’s
information.
Methodology: The sample of the study consists of (60) hypertensive clients who attended Al Anbar Health Office –Al
Andalus Health Center during the period of the study from the14th of March 2010 to the 30th of September 2010. The
sample is divided into two groups; study group (30) hypertensive clients who received dietary educational program
and control group (30) hypertensive clients who received a routine care from the center. Three major instruments
were used; these instruments included (1) knowledge test which was applied on both groups pretest and eight weeks
post-test (2) questions to know

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (18)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Fri Dec 20 2024
Journal Name
Bulletin Of The Iraq Natural History Museum
ADDITIONAL INFORMATION WITH A CHECKLIST OF LAND SNAILS IN IRAQ
...Show More Authors

Land snails constitute an important group of mollusks distributed worldwide. This study reports on land snails found in Iraq. A survey of terrestrial gastropods was performed during their activity seasons in gardens, agricultural lands and nurseries in Iraq from March 2022 to September 2023. Fifteen terrestrial snails belonging to seven families were documented. The species Euchondrus michonii (Bourguignat, 1853) was identified and recorded based on several distinct conchological characters for the first time in Iraq. The recently collected specimens, along with those previously recorded in Iraq, were included in this checklist. Essential information on each species is also presented. As there is no previous checklist or study that

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors