Preferred Language
Articles
/
uRcw8I0BVTCNdQwCSylL
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Thu Jan 01 2015
Journal Name
Iet Colloquium On Millimetre-wave And Terahertz Engineering & Technology 2015
Millimetre wave semiconductor based isolators and circulators
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Reinforcement Learning-Based Television White Space Database
...Show More Authors

Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 18 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Quadtree partitioning scheme of color image based
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (23)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Jour Of Adv Research In Dynamical & Control Systems
Strategic Cost Management Tools Under Technological Development and Change in Customer Tastes Critical Studies
...Show More Authors

Strategic Cost Management Tools Under Technological Development and Change in Customer Tastes Critical Studies

Publication Date
Tue Dec 20 2022
Journal Name
International Journal Of Professional Business Review
Improve the Competitive Advantage Through Human Resources Management Practices in the Iraqi Banking Sector
...Show More Authors

Purpose: This study's objective is to assess this relationship in the context of the banking industry in Iraq. The human resources management practices (HRMPs) Theoretical framework: in this study included recruiting and selection, training and development, performance appraisal, compensation and reward to testing relationship HRMPs. Design/methodology/approach: in this study; We analysed by used a quantitative approach, and 246 employees were selected as a sample and given a questionnaire. The SPSS software was used to examine the data that were obtained from the questionnaire. Findings: The study's findings revealed a variety of hypotheses and conclusions, including the following: competitive advantage (CA) is positively impacted by

... Show More
Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Al-kindy College Medical Journal
Awareness Regarding Diabetes Risk Factors, Prevention and Management among Community Members in Diyala/Baqubah
...Show More Authors

Background: Background: Diabetes mellitus is a life-threatening disease. Global prevalence of diabetes mellitus is increasing rapidly providing a worrying indication and major threat to global health unless interventions are created through community awareness and knowledge regarding different aspect of DM.

Aims: To assess the level of awareness regarding diabetes risk factors, prevention and management among community members in Baqubah city and to identify any association between awareness level and some variables.

Methods: Across sectional study was carried out from the 1st of January - 30th of November 2019 in all primary health care centers (six centers) in center of Baqubah city. A convenien

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering Science And Technology
Water quality modelling and management of diyala river and its impact on tigris river
...Show More Authors

Scopus (19)
Scopus