Preferred Language
Articles
/
ZULPmpoBMeyNPGM3RM4K
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 29 2024
Journal Name
International Journal Of Heat And Technology
The Effect of Wall'S Porous Liner on MHD Couette Flow of Carreau Fluid in an Inclined Channel under the Convective Conditions
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program on Female Students’ Practices toward Premenstrual Syndrome at Secondary Schools in Third Al- Rusafa Education Directorate
...Show More Authors

Objective: Determination the effectiveness of educational program on female students’ practices toward premenstrual.

Methodology: A quasi-experimental design study was conducted involving (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criteria to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the practices, before the implementation of the program, the second step is implementing the program, following two steps post-test  I and II betwe

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Financial Variables and Their Effects on The Development of Bank Credit and Productive Sectors in Iraq Using a Path Analysis Model
...Show More Authors

This study aims to measure and analyze the direct and indirect effects of the financial variables, namely (public spending, public revenues, internal debt, and external debt), on the non-oil productive sectors with and without bank credit as an intermediate variable, using quarterly data for the period (2004Q1–2021Q4), converted using Eviews 12. To measure the objective of the study, the path analysis method was used using IBM SPSS-AMOS. The study concluded that the direct and indirect effects of financial variables have a weak role in directing bank credit towards the productive sectors in Iraq, which amounted to (0.18), as a result of market risks or unstable expectations in the economy. In addition to the weak credit ratings of borr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The Influence of Different Fabrication and Impression Techniques on the Marginal Adaptation of Lithium Disilicate Crowns (A comparative in vitro study)
...Show More Authors

Background: The marginal adaptation has a key role in the success and longevity of the fixed dental restoration, which is affected by the impression and the fabrication techniques .The objective of this in vitro study was to evaluate and compare the marginal fitness of lithium disilicate crowns using two different digital impression techniques (direct and indirect techniques) and two different fabrication techniques (CAD/CAM and Press techniques). Materials and Methods: Thirty two sound upper first premolar teeth of comparable size extracted for orthodontic reason were selected in this study .Standardized preparation of all teeth samples were carried out with modified dental surveyor to receive all ceramic crown restoration with 1 mm deep

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Impact of quantitative (indirect) instruments of monetary policy on some indicators of financial stability in Iraq for the period (2003-2016)
...Show More Authors

The indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Underwriting policy and its impact on the productivity of the life insurance portfolio: Analytical study in the "Iraqi General Insurance Company
...Show More Authors

The research aims to study the basic concepts of the underwriting policy with its various indicators. The researcher studies the underwriting policy with its various indicators (sex, health status, age of the insured, insurance amount, The method of acceptance, payment method, and duration of insurance) where each of these indicators constitute an important factor in the productivity of life insurance policies, where the productivity of life insurance policies face many difficulties because insurance is a service and not a tangible material commodity and its benefits and not current. Therefore, the life insurance company needs to use a prudent underwriting policy so as not to endanger its financial position due to the expansion of the un

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Health Educational Program on Nurses’ Knowledge About Communication Skills with Children at Welfare Children Teaching Hospital in Baghdad City
...Show More Authors

Background: Therapeutic communication is the basis of interactive relationships among nursing team and their children: that affords opportunities to establish rapport, understand the client’s experience, formulate individualized or client interventions and optimize health care resources.

Objectives: The main aim of the study is to determine the Effectiveness of Education Program on Nurses’ Knowledge about Communication Skills with Children.

Methodology: A quasi-experimental study was conducted in Children Welfare Teaching Hospitals from 7th, October 2018 to the 20th, May 2019. The program and instruments have been constructed by the researcher for the purpose of the study. A non- prob

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 23 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of various endodontic irrigants on the sealing ability of Biodentine and other root perforation repair materials (In vitro study)
...Show More Authors

Background: This in vitro study was carried out to evaluate the effect of various endodontic irrigants (sodium hypochlorite, ethylene diaminetetracetic acid and normal saline) on sealing ability of (Biodentine, mineral trioxide aggregate, and amalgam) used to repair furcal perforations. Material and methods: One hundred and twenty extracted human molars with divergent roots were used in this study. A standard root canal access cavity was prepared in each tooth and furcal perforation was made and was standardized by using k file size 100 instrument to get a perforation of (1.32mm) in diameter .The teeth were randomly divided in to three groups of 40 teeth according to the type of material used to repair the perforations (Group A: The furcal

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 03 2019
Journal Name
Diyala Journal For Pure Scince
Study influence of thickness and electrode mater on some electrical properties for ZnSe thin films prepared by thermal evaporation in vacuum
...Show More Authors

Thin films of Zinc Selenide ZnSe have been prepared by using thermal evaporation in vacuum technique (10-5Torr) with thickness (1000, 2700, 4000) A0 and change electrode material and deposited on glass substrates with temperature (373K) and study some electrical properties at this temperature . The graphs shows linear relation between current and voltage and the results have shown increases in the value of current and electrical conductivity with increase thickness and change electrode material from Aluminum to Copper

Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF