Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 30 2024
Journal Name
مجلة كلية اللغة العربية بأسيوط
Shades of meanings of letters in Arabic (Some double and triple letters are an example)
...Show More Authors

Meaning letters in Arabic are characterized by the diversity and abundance of their linguistic material, and are also distinguished by their large number and types, to the point that some of them have reached a hundred letters confined to five categories

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Energy Conversion And Management
Improved PCM melting in a thermal energy storage system of double-pipe helical-coil tube
...Show More Authors

View Publication
Scopus (139)
Crossref (132)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
Numerical Investigation of Heat Transfer Enhancement of Double Pipe Heat Exchanger Using Metal Foam Fins
...Show More Authors

The influence of adding metal foam fins on the heat transfer characteristics of an air to water double pipe heat exchanger is numerically investigated. The hot fluid is water which flows in the inner cylinder whereas the cold fluid is air which circulates in the annular gap in parallel flow with water. Ten fins of metal foam (Porosity = 0.93), are added in the gap between the two cylinder, and distributed periodically with the axial distance. Finite volume method is used to solve the governing equations in porous and non-porous regions. The numerical investigations cover three values for Reynolds number (1000 ,1500, 2000), and Darcy number (1 x10-1, 1 x10-2, 1x10-3). The comparison betwee

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)
...Show More Authors

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Sep 28 2024
Journal Name
Journal Of The Pakistan Medical Association
Pulse transmission time and amplitude of digital pulse wave determined by fingertip plethysmography as a surrogate marker of brachial artery flowmediated dilatation
...Show More Authors

Objectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Organizational culture and its role in improving the quality of educational service at the university center Tindouf from the perspective of professors.
...Show More Authors

This paper examines the impact of the organizational culture prevailing at the university center, Ali KafiTindouf, on the quality of the educational service provided by the university center Ali KafiTindouf from the point of view of the teachers of the center. The questionnaire method was used to determine the effect between the variables studied, by the distribution of 33 questionnaires on a random sample of the study community.

The study found that the organizational culture prevailing at the university center of Ali KafiTindouf contributed to reaching higher levels in the awareness and quality of the educational service provided by the teachers of the center.<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Extent to Which the Internal audit function contributes to improving administrative performance: A field study in the Baghdad Health Department / Rusafa
...Show More Authors

Abstract:

                The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication