Preferred Language
Articles
/
ZULPmpoBMeyNPGM3RM4K
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Impact of two non-nutritive sucking patterns on the development of anterior open bite in children of two kindergartens in Baghdad city
...Show More Authors

Background: Non-nutritive sucking habit (NNSH) is the main environmental causative factor that disturbs normal orofacial development. In spite of the harmful effect of pacifier as a NNSH, mothers aware from the other types of NNSH like thumb sucking far more than pacifier use. Open bite is one of the most challenging malocclusions in orthodontics due to the high prevalence of relapse after treatment, so preventing the causative factor of its occurrence is essential at early age of child life. This study aims to assess the impact of two non-nutritive patterns on the development of anterior open bite in primary dentition and to compare which of these habits mostly affect open bite development. Materials and Methods: The sample consisted of

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Wed Nov 14 2018
Journal Name
Journal Of Engineering And Applied Sciences
DEMONSTRATE OF MAGNETIC FIELD EFFECT ON THE CAPABILITY OF ADSORPTION PROCESS IN THE REMOVAL OF AZO DYE FROM THE AQUEOUS SOLUTIONS ON CALCINED IRAQI BENTONITE CLAY MINERAL VIA COLUM
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effect of the think, pair, and share strategy of using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women
...Show More Authors

The research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Return Variation on Investment as a Function for the Difference of Market Share: An Applied Research on a Sample of Private Banks listed in Iraq Stock Exchange (ISX)
...Show More Authors

    The research specified with study the relation  between the market share for the sample research banks and the amount of the achieved revenues from the investment, where the  dominated belief  that there potentiality enhancing the revenue on investment with the increase of the banks shares in their markets after their success in achieving rates of successive growth in their sales of sales and to a suitable achieve  market coverage for their products and they have dissemination and suitable  promotion activity, the  market share represented the competition  for the banks, and the markets pay attention to the  market share as a strategic objective and to maintain them also increasi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Effect of Extracts Alkaloids Cordia myxa leafs on fourth larval stage in lesser grain borer Rhyzopertha dominica (F.)(Coleoptera:Bostrichidae): Effect of Extracts Alkaloids Cordia myxa leafs on fourth larval stage in lesser grain borer Rhyzopertha dominica (F.)(Coleoptera:Bostrichidae)
...Show More Authors

An experimental study was conducted to evaluate the effect of AL-coholic extract alkaloid of Cordia myxa leafs in fourth larval stage of lesser grain borer Rhyzopertha dominica. Using alkaline extracts of 8%, the study has been shown clear effect increased in mortality rate for fourth larval stage 93.3% and degressed to 66.6% at 4% concentrate to 13.3% with control treatment .Ahigher percentage of pupal mortality 16.6% at 4% concentrate has been observed, while no natural emergence carried out at concentrates of 4.6% comparing with control treatment of 86.66%, at the same time percentage of deformation has been increased to 16.66% at 4% of extracts and degressed to 6.66% at 6% while no deformation have been shown with control treatment .

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 04 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFET OF SOME ISOLATION FROM FUGI BAGHDAD HOSPITAL ON PHYSIOLOGY OF LIVER, KIDNEY AND TESTIS IN ALBINO MALE MICE.: EFFET OF SOME ISOLATION FROM FUGI BAGHDAD HOSPITAL ON PHYSIOLOGY OF LIVER, KIDNEY AND TESTIS IN ALBINO MALE MICE.
...Show More Authors

Some types of the fungus Aspergillus were isolated from some hospitals in the city of Baghdad (Imam Ali Hospital and Sadr General Hospital). The samples were taken by Transport media at a rate of three replicates of each place isolated from samples from different places within the hospital (waste, baths, the sick beds, corridors and room floors) for the purpose of isolating and diagnosing the fungus on the Czapeck Dox Agar media. It was noticed that the spread rate of fungus Aspergillus was 70% compared to other species that have emerged during the isolation process of the Sabouraud's Dextrose Agar media. The species A.niger (56.25%) was considered the most common type of fungus visible during the isolation process of the Imam Ali Hospit

... Show More
View Publication Preview PDF