Preferred Language
Articles
/
eRiMKZUBVTCNdQwCBCkg
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Distortion And Its Relationship of Parenting Reinforcement For Kindergarten Children
...Show More Authors

This research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.                         

After ensuring the validity and reliability of the two research tools and their suitabi

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economic And Administrative Science
On Shrinkage Estimation for Generalized Exponential Distribution
...Show More Authors

Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Engineering And Sustainable Development
NEW TRENDS FOR ANGLE OF ARRIVAL ESTIMATION
...Show More Authors

View Publication
Crossref
Publication Date
Sun May 11 2025
Journal Name
Iraqi Statisticians Journal
Nonparametric Estimation for Nonstationary Time Series Models
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Lecture Notes In Computer Science
Constrained Differential Evolution for Cost and Energy Efficiency Optimization in 5G Wireless Networks
...Show More Authors

The majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Wireless Communications And Mobile Computing
Corrigendum to “Developing a Video Buffer Framework for Video Streaming in Cellular Networks”
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Crossref