Preferred Language
Articles
/
bsj-6219
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise Jaccard index of the membership of the multipaths to their clusters. The multipaths generated by C2CM were transformed using the directional cosine transform (DCT) and the whitening transform (WT). The transformed dataset was clustered using SC and 3CAM-SC. The clustering performance was validated using the Jaccard index by comparing the reference multipath dataset with the calculated multipath clusters. The results show that the effectiveness of SC is similar to the state-of-the-art clustering approaches. However, 3CAM-SC outperforms SC in all channel scenarios. SC can be used in indoor scenarios based on accuracy, while 3CAM-SC is applicable in indoor and semi-urban scenarios. Thus, the clustering approaches can be applied as alternative clustering techniques in the field of channel modeling.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Extent of Fulfilling Total Quality Standards by Applied Sciences Colleges in the University of Technology and Applied Sciences in Light of the National Strategy of Education 2040 in the Sultanate Of Oman.
...Show More Authors

Abstract

The study aims to identify the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in light of the national education strategy for the 2040 Vision in the Sultanate of Oman. To do this, the researchers used the descriptive approach. They used a questionnaire as a tool for data collection that was applied to (237) administrators, academics, and support functions. The study found that the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in the light of the National Education Strategy 2040 in the Sultanate of Oman recorded a high range. The study als

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Electronic Customer Trust Building Tools On Excellent Performance An analytical study of the opinions of a sample of individuals in the administrative and leadership positions in the Northern Cement Company
...Show More Authors

The current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question:  “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.

The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 24 2026
Journal Name
Journal Of Physical Education
A comparative analysis , for some Elkinmetekih variables , in the performance of the skill (Nick shot the front reverse ) , between the players of the Iraqi team and the Egyptian , for young people in squash
...Show More Authors

View Publication
Publication Date
Mon Oct 04 2923
Journal Name
Journal Of Sustainable Studies
Enantiosemy in a Comparative Aspect: On the Material of Modern Russian and Arabic Languages Энантиосемия в сравнительном аспекте: На материале современного русского и арабского языков التضاد - دراسة مقارنة : اللغات الروسية والعربية الحذيثة أنمورجا
...Show More Authors

This work is devoted to a comparative study of the phenomenon of enantiosemy in Russian and Arabic.Everyone knows the term antonyms - words of the same part of speech, opposite in meaning, such as: Day and night, white and black, truth and lies. But in Russian, Arabic and other languages there is an interesting phenomenon, which consists in the fact that one word has two opposite meanings. Such a phenomenon in linguistics is called enantiosemy (from the Greek words enantios - "opposite" and sema - "sign")

Publication Date
Sat Nov 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the tax gap resulting from the application of the direct deduction method and its reflection on the financial objective of the tax: Applied research in the General Directorate of education in Diyala
...Show More Authors

The research aims to shed light on the nature of the tax gap in the income tax by the method of direct deduction and its reflection on the financial objective of the tax, and to determine the reasons for this gap in the deduction between the tax due in accordance with the laws and instructions in force and the tax actually paid. The tax gap is a real problem that cannot be ignored for what it represents loss of financial revenues due to the state.

The research problem is represented in the existence of a gap between the tax due according to direct deduction instructions and the tax actually paid according to the financial statements, and to achieve the objectives of the research and test the hypotheses, t

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of a Structural Theory- based Training Program in Enhancing Arabic Language Teachers’ Teaching Practices and their Tendencies towards Structural Teaching: مريم بنت حسن البلوشي، ريا بنت سالم المنذري، علي مهدي كاظم
...Show More Authors

The study aims to identify the effectiveness of a structural theory-based training program in enhancing the teaching practices of Arabic language teachers teaching grade ten in South Al Batinah in Sultanate of Oman. The study used the quasi-experimental design, and the sample consisted of 40 male and female teachers. To achieve the objectives of the study, a training program, an observation form and a measurement tool of teachers’ tendencies towards a structural teaching were made. The program was implemented with an experimental group of 20 female and male teachers in the first semester of the academic year 2018/2019. The study has found that there is a statistically significant difference between the average grades before and after i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 25 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the extent to which listed companies comply with sustainability accounting standards by improving performance and financial reporting to enhance confidence in financial statements: بحث تطبيقي مقارن في عينة من الشركات العراقية والعربية
...Show More Authors

The objective of this research is to know the extent to which Iraqi and Arab companies apply the criteria of accounting for sustainability and disclosure, as well as to analyze the content of the annual financial reports of the companies listed in the financial market to determine their compliance with the Sustainability Accounting Standards Board )SASB(. Annual Report The commitment of telecommunications companies to implement sustainability issues related to the standard of telecommunications services reached a general average of (54%) for the sample of the research sample. This means that there is a degree of admissibility in applying the standard. As well as the highest level of reporting to the criterion of the (Jordan Telec

... Show More
View Publication Preview PDF