In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThe problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which
... Show MoreIntroduction & Aim: Long-term diabetes mellitus (DM) is known to have a deleterious impact on bone health, resulting in change in bone mineral density, bone turnover, and bone quality, all of which increase the risk of fractures. The aim of. this study was to link immunological and pro-inflammatory cytokine (I.L-6, I.L-1, and TNF-alpha) markers in patients.with type 1 diabetes to Their connection to bones formation (sPINP) and bone resorption parameters (sCTX). Materials & Methods: This study included 80 patients suffering from T1DM in the age range of 20-45 years. The patients were assayed for their biochemical (Vitamin D and HbA1c), Immunological (IL-6, IL-1 and TNF-alpha) parameters, as well as bone formation and resor
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreThe research aims to shed light on the ethics of information systems and their role in achieving banking excellence for a sample of private banks in the province of Baghdad. It is important to focus on studying the ethics of banking information systems, which has become one of the most important basic and strategic resources that banks rely on to achieve outstanding performance. Achieving banking leadership in the Iraqi banking market. The researchers adopted the descriptive analytical approach to the research, and the questionnaire was considered as a main tool for collecting information in addition to personal interviews. The research reached the most important results that there is an acceptable correlation relationship between the ethic
... Show MoreThis paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach
... Show MoreThe impact of television has made it an essential technology that can't be dispensed with in all circumstances and situations, measuring the society's need for it. Some argue that there is no stronger media than television in introducing people of the world to each other, as it has the most powerful impact and attracts millions of viewers.
Television is deemed as the most effective tool of media as it is designed to capture both sound and image. The image, in itself, has the ability to engage and interact with our thoughts. In light of the aforementioned, it is noticeable that this interactive medium (television) has significantly evolved over the years, thanks to modern technologies that have been introduced over time. These advancem
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThis aims tackles the importance of the organizational energy of the hotel organizations that search the success in the business field to penetrate in the whole tourist markets, and to draw the policies and firm rules which must be framed with the administrative strategies that contributed in creativity and achievement the targets besides provide a future vision due to its position among the competitive henceforth achieving the activity. This is what the chapters tackle in the theoretical side. Also many general questions have been arisen to determinate the importance of the research and many other special questions that express the problem of the study. To limit the levels of study alter
... Show MoreThis paper examined accounting information systems (AIS) as a mediator between small and medium-sized enterprises (SMEs) strategies, including (finance source, administrative innovation, organizational culture, developing capabilities levels of SMEs, information source, development of business managers, and technological innovation) and organizational performance. In this quantitative study, 450 self-administered questionnaires were distributed to the managers and owners of SMEs using purposive sampling. Data were analyzed using the structural equation modeling (SEM) method via SmartPLS3 Software. The study offers empirical findings on the importance of AIS as a mediator, considers various factors, a