Preferred Language
Articles
/
7UIufJoBMeyNPGM3mMxC
Secure Wireless Communications in Broadcast Channels With Confidential Messages
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Mobile Application to Locate and Track Person's Whereabouts and Send SOS Messages
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Secure Seaport Management System using Blockchain Technology
...Show More Authors

Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat May 16 2026
Journal Name
Al–bahith Al–a'alami
Framing an argument of Normalization with Israel on the websites of directed satellite channels Analytical study of the sites (Al-Alam, Al-Hurra) channels
...Show More Authors

The aim of this paper is to study the frames of Argument of normalization with Israel on the websites of the satellite channels directed in the Arabic language (Al-Alam and Al-Hurra Iraq) channels by analyzing the mechanisms of framing an Argument, The way in which we frame an issue largely determines how that issue will be understood and acted upon، The research adopted the survey method applied to the sites of(Al-
Alam and Al-Hurra) channels, at the period 13 Aug. - 12 Nov. 2020, which included (855) news items, (633) for Al-Alam channel website, and (222) for Alhurra Iraq channel website.
The most important results are: The two channels dependence on the Argument Directed, Al-Alam channel focuses on Islamic and Arab attitudes,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering
The Effecting of Human Body on Slotted Monopole Antenna in Wearable Communications
...Show More Authors

In this paper, the characteristics of microstrip monopole antennas are studied firstly in free space. Secondly, the effects of the human body on the studied antenna's performance are investigated for wearable communications. Different patch shapes of microstrip monopole antenna are chosen to operate at two bands: industrial scientific and medical band (ISM) and ultra-wideband (UWB) for wearable applications. The studied antenna consists of a radiating element on one side of the substrate and a partial ground plane on the other side. The antenna is supposed to fabricate on cloth fabric whose relative dielectric constant is Ɛr =1.7. At the same time, the pure copper could be used as the conducting part representing both t

... Show More
View Publication Preview PDF
Crossref (6)
Crossref