Preferred Language
Articles
/
joe-1661
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Influence of Solar and Geomagnetic Activity on the Ionospheric Sporadic-E Layer Over Baghdad
...Show More Authors
Abstract<p>This study examines the monthly mean diurnal variations of the ionospheric sporadic E (Es) layer’s critical frequency (<italic>foEs</italic>) and virtual height (<italic>h′Es</italic>) above Baghdad city (latitude 33.3˚N, longitude 44.4˚E) during Solar Cycle 22 (1988–1995). The analysis examines their correlation with solar activity, represented by sunspot numbers, and geomagnetic disturbances, particularly during the descending phase of the cycle. The findings revealed that <italic>foEs</italic> values were the highest during the solar maximum years (1989–1991), aligning with increased sunspot numbers and geomagnetic activity due to coronal mas</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Investigation of Groundwater and The Impact of Over-Pumping in Al-Haydariyah Region, Iraq
...Show More Authors

In this study; a three-dimensional model was created to simulate groundwater in Al-Haydariyah area of the governorate of Al-Najaf. A solid model was created to utilize the cross sections of 25 boreholes in the research region, and it was made out of two layers: sand and clay. The steady-state calibration was employed in six observation wells to calibrate the model and establish the hydraulic conductivity, which was 17.49 m/d for sand and 1.042 m/d for clay, with a recharge rate of 0.00007 m/day. The wells in the research region were reallocated with a distance of 1500 m between each well, resulting in 140 wells evenly distributed throughout the study area and with a discharge of 5 l/s, and the scenarios were run for 1000

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Wiadomości Lekarskie Medical Advances
EVALUATION OF VEST-OVER-PANT TECHNIQUE IN THE TREATMENT OF POST-HYPOSPADIAS URETHROCUTANEOUS FISTULA
...Show More Authors

The aim: In this study, we present and evaluate the vest-over-pants technique as a simple way to correct urethrocutaneous fistulas after hypospadias. Materials and methods: Between October 2018 and June 2020, twenty male patients aged 5 to 20 years came to us with post hypospadias repair fistula, these patients underwent vest-over-pant repair of their fistula. The size of fistula was ranging between 2.5-5 mm. The distribution of fistula was coronal (3 patients), distal penile (9 patients), midshaft (2 patients) and proximal penile (6 patients). In 14 patients there were single fistula and 6 patients had more than one fistula. Eleven of patients were exposed to a previous failed fistula repair procedure. Results: Six months after the operati

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
The impact of node density over routing protocols in manet by using NS-3
...Show More Authors

Scopus (5)
Scopus
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Over the awareness of managers strategic importance of vigilance: "Exploratory study in the National Insurance Company"
...Show More Authors

The rapid reality of events in the information era, and the enormous pressure of forces market, competition, permanent movement of the markets and consumers and the large development unprecedented of technology in all areas make a lot of organizations find it difficult to keep up with this rapid developments .Here was the role of strategic vigilance closer organization to their environment ,and play an active role in providing the necessary information to make decisions and insurance companies are not far from those changes .On this basis the researcher offered studied(Over the awareness of managers of insurance companies for strategic vigilance).Choosing sample of 35 managers in the National Insurance Company to test th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment, And Sustainability: Tmrees23fr
Effect of gold nanoparticles synthesis by plasma jet scheme on normal cell lines
...Show More Authors

New evidence on nanotechnology has shown interest in the creation and assessment of nanoparticles for cancer treatment. Worldwide, a wide range of tumor-targeted approaches are being developed to reduce side effects and boost the efficacy of cancer therapy. One strategy that shows promise is the use of metallic nanoparticles to increase the radio sensitization of the cancer cells while reducing or maintaining the normal tissue complication probability during radiation therapy. In this study, atmospheric plasma was created using argon gas to create Au NPs using the plasma jet scheme, and their ability to induce apoptosis as an anticancer mechanism was tested. Aqueous gold tetrachloride salts (HAuCl4·3H2O) ere used to produce gold nanopartic

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Numerical Investigation, Error Analysis and Application of Joint Quadrature Scheme in Physical Sciences
...Show More Authors

In this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.

View Publication Preview PDF
Scopus (18)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref