Preferred Language
Articles
/
vBdUPo4BVTCNdQwCGD47
Secure QR-Code Generation in Healthcare
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Implication of Yield Lines Theory in Method Three of the ACI Code for Two-Way Reinforced Concrete Slabs
...Show More Authors
Abstract<p>Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 09 2017
Journal Name
International Journal Of Pharmacy Practice
Factors influencing the degree of physician–pharmacist collaboration within Iraqi public healthcare settings†
...Show More Authors
Abstract<sec> <title>Objectives

Medication safety and effectiveness can be improved through interprofessional collaboration. The goals of this study were to measure the degree of physician–pharmacist collaboration within Iraqi governmental healthcare settings and to investigate factors influencing this collaboration.

Methods

This cross-sectional study was conducted in Al-Najaf Province using the Collaborative Working Relationship Model and Physician–Pharmacist Collaborative Instrument (PPCI). Four phar

... Show More
View Publication
Scopus (21)
Crossref (17)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
GENERATION OF MPSK SIGNAL USING LOGIC CIRCUITS
...Show More Authors

The traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 22 2024
Journal Name
Proceedings Of The Acm/ieee 27th International Conference On Model Driven Engineering Languages And Systems
Requirement-Driven Generation of Distributed Ledger Architectures
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Journal Of Engineering
Babylon Governorate Municipal Solid Waste Generation Rate
...Show More Authors

Municipal solid waste generation in Babylon Governorate is often affected by changes in lifestyles, population growth, social and cultural habits and improved economic conditions. This effect will make it difficult to plan and draw up future plans for solid waste management.In this study, municipal solid waste was divided into residential and commercial solid wastes. Residential solid wastes were represented by household wastes, while commercial solid wastes included commercial, institutional and municipal services wastes.For residential solid wastes, the relational stratified random sampling was implemented, that is the total population should be divided into clusters (socio-income level), a random sample was taken in e

... Show More
View Publication Preview PDF
Crossref (4)
Crossref