Preferred Language
Articles
/
GBe7WpEBVTCNdQwCq5UK
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Computational And Theoretical Nanoscience
Development of Wireless Controlling and Monitoring System for Robotic Hand Using Zigbee Protocol
...Show More Authors

Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
Robust speaker verification by combining MFCC and entrocy in noisy conditions
...Show More Authors

Automatic speaker recognition may achieve remarkable performance in matched training and test conditions. Conversely, results drop significantly in incompatible noisy conditions. Furthermore, feature extraction significantly affects performance. Mel-frequency cepstral coefficients MFCCs are most commonly used in this field of study. The literature has reported that the conditions for training and testing are highly correlated. Taken together, these facts support strong recommendations for using MFCC features in similar environmental conditions (train/test) for speaker recognition. However, with noise and reverberation present, MFCC performance is not reliable. To address this, we propose a new feature 'entrocy' for accurate and robu

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
International Journal Of Innovative Computing, Information And Control
ITTP: A new transport protocol for VoIP applications
...Show More Authors

View Publication
Scopus (14)
Scopus
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Evergreen
Combustion Characteristics of a Free Piston Engine Linear Generator using Various Fuel Injection Durations
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A Study on the Effect of Multistage Toolpath in Fabricating a Customized Cranial Implant in Incremental Sheet Metal Forming
...Show More Authors

Incremental sheet forming (ISF) process offers a high degree of flexibility in the manufacturing of different sheet parts, which makes it an ideal candidate for prototype parts as well as efficient at fabricating various customized products at low production costs compared to traditionally used processes. However, parts produced in this process exhibit notable geometrical inaccuracy and considerable thickness reduction. In this paper, the single point incremental sheet forming variant of the process has been implemented to manufacture a highly customized cranial implant starting from the computed tomography (CT) scan data of the patient's anatomy. A methodology, from the modeling to the realization of the implant, is presented and discus

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref