Preferred Language
Articles
/
ijs-5481
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
...Show More Authors

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on the cloud, so that if someone gains access to the server, it would be unable to access the original information. Performance evaluation of the developed system is performed by comparing ECC with the RSA algorithm. The results show that the ECC method is more efficient than RSA when used to secure information in the cloud.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 05 2017
Journal Name
Neural Computing And Applications
Hybrid soft computing approach for determining water quality indicator: Euphrates River
...Show More Authors

View Publication
Scopus (35)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Study of growth curve and morphological change for Trichomonas vaginalis parasite in the tow culture media
...Show More Authors

The objective of this study was shed light for cultivation and maintenance of Trichomonas vaginalis parasite growth after isolated it by vaginal swaps from females suffering vaginitis and abnormal vaginal discharges in these media CPLM and TAB media to detect growth curve, morphological changes and viability of parasite in the two culture media, together with effect of sheep and bovine serum on the growth of it. The results of this studies were showed there was abtaine differences between the two types of media , The maximum growth of parasite was in TAB medium after 72 hours incubation with use of bovine serum, while such growth was maximized after 144 hours incubation with the use of sheep serum. In CPLM medium, a maximum gro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Self-Interference Cancellation Techniques for In-Band Full-Duplex Wireless Communication Systems: A Review
...Show More Authors

      In-Band Full-Duplex (IBFD) systems have the capability of simultaneously transmitting and receiving signals through the channel and require the same resources as half-duplex systems. Unfortunately, IBFD systems have self-interference (SI) issues that prevent the system from gaining double throughput with respect to half-duplex systems. Therefore, the IBFD system will be more reliable if SI is mitigated more. This contribution will look at SI cancellation in wireless radio and underwater acoustic systems. The reviewed documents cover all types of SI cancellations, including passive, analog, and digital cancellations. In a practical full-duplex system, the SI cancellation for all domains must cancel the SI below the receiver noi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
The Evaluation of Accuracy Performance in an Enhanced Embedded Feature Selection for Unstructured Text Classification
...Show More Authors

Text documents are unstructured and high dimensional. Effective feature selection is required to select the most important and significant feature from the sparse feature space. Thus, this paper proposed an embedded feature selection technique based on Term Frequency-Inverse Document Frequency (TF-IDF) and Support Vector Machine-Recursive Feature Elimination (SVM-RFE) for unstructured and high dimensional text classificationhis technique has the ability to measure the feature’s importance in a high-dimensional text document. In addition, it aims to increase the efficiency of the feature selection. Hence, obtaining a promising text classification accuracy. TF-IDF act as a filter approach which measures features importance of the te

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow in Wired Networks
...Show More Authors

<p>The demand for internet applications has increased rapidly.  Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model for Using a Students Attendance Management Information Systems/ A Case Study In Lebanese French University/ Erbil
...Show More Authors

This study aims to design unified  electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed  the acceptable limit of being absent, and by that we can replace the traditional way of  using papers to count absence,  with  a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.

            In order to achieve the study's objectives, we designed an information syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 24 2021
Journal Name
Iraqi Journal Of Science
The Optimum Site Selection for Solar Energy Farms using AHP in GIS Environment, A Case Study of Iraq
...Show More Authors

    Recently, renewable energy (RE), such as solar energy, sources have proven their importance as an alternative source of fuel. The utilizing of solar energy can contribute to move the world towards relying on clean energy to curb global warming. However, the placement of solar farms is a major priority for planners as it is a critical factor in the succession energy project. This study combines one of the multi-criteria decision-making techniques Analytic Hierarchy Process (AHP) and Geographic Information System (GIS) to assess the suitability of land for establishing solar farms in Iraq. Numerous climatic, geomorphological, economic, and environmental criteria and some exclusionary constraints have been adopted in mode

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Design of Multi-Rate Multi-Zone Wireless Fuzzy Temperature Control System for Greenhouse Application
...Show More Authors

sensor sampling rate (SSR) may be an effective and crucial field in networked control systems.  Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur

... Show More
View Publication Preview PDF
Crossref