Preferred Language
Articles
/
bsj-5256
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 24 2025
Journal Name
Journal Of The American Oil Chemists' Society
Development of natural deep eutectic solvent‐assisted liquid–liquid extraction method for soap removal from biodiesel: Optimization and kinetics
...Show More Authors
Abstract<p>The soap content in biodiesel is an important challenge during the production and purification processing of biodiesel. Natural deep eutectic solvents (NADES) have recently attracted considerable interest as an environmentally suitable substitute for traditional solvents in the biodiesel industry. This work investigates the soap removal from the contaminated biodiesel using NADES. Eight choline chloride‐based deep eutectic solvents (DESs) were screened using the conductor‐like screening model for real solvents (COSMO‐RS) to identify the most suitable solvent for soap removal and were validated experimentally. The effect of NADES molar ratio, NADES:biodiesel ratio, mixing speed and extraction ti</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Case Studies In Chemical And Environmental Engineering
Optimization of photocatalytic process with SnO2 catalyst for COD reduction from petroleum refinery wastewater using a slurry bubble photoreactor
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Optimization of Fenton process for removal of chemical oxygen demand (COD) from hospital wastewater using response surface methodology (RSM)
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Oct 30 2025
Journal Name
International Journal Of Environmental Analytical Chemistry
Integrated biomass algae @ cross-linked pyromellitic dianhydride chitosan biocomposite for methyl violet 2B adsorption: modelling and experiment design optimization
...Show More Authors

A new adsorbent was developed by integrating algae biomass (AG) into a chitosan (CN) matrix, followed by structural enhancement via crosslinking with pyromellitic dianhydride (PMDA) through a hydrothermal synthesis approach. This process resulted in the formation of a robust AG@CN-PMDA composite with improved physicochemical characteristics suitable for advanced adsorption applications. The AG@CN-PMDA composite was evaluated for its efficiency in removal of the cationic dye methyl violet 2B (MV 2B) from aqueous solution. The adsorption process was refined through the Box-Behnken design (RSM-BBD), evaluating three essential parameters: adsorbent dosage (A: 0.02–0.1 g/100 mL), pH (B: 4–10), and time (C: 5–20 min). The ideal conditions f

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Arduino-Based Controller for Sequence Development of Automated Manufacturing System
...Show More Authors

It has become necessary to change from a traditional system to an automated system in production processes, because it has high advantages. The most important of them is improving and increasing production. But there is still a need to improve and develop the work of these systems. The objective of this work is to study time reduction by combining multiple sequences of operations into one process. To carry out this work, the pneumatic system is designed to decrease\ increase the time of the sequence that performs a pick and place process through optimizing the sequences based on the obstacle dimensions. Three axes are represented using pneumatic cylinders that move according to the sequence used. The system is implemented and

... Show More
Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

The aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 24 2026
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref