Preferred Language
Articles
/
rRZ_l4cBVTCNdQwC1VfG
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is preprocessed and transform of into some intermediate form which can be compressed with better efficiency and security. This solves some problems relevant to the common encryption methods which generally manipulate an entire data set, most encryption algorithms tend to make the transfer of information more costly in terms of time and sometimes bandwidth.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Mon Jul 03 2023
Journal Name
Veterinary Integrative Sciences
Crimean-Congo hemorrhagic fever favouring factors virus transmission: Special focus on Iraq and neighbouring countries
...Show More Authors

Arthropod-borne infections, known as vector-borne diseases, are a significant threat to both humans and animals. These diseases are transmitted to humans and animals through the bites of infected arthropods. In the last half century, there have been a number of unexpected viral outbreaks in Middle Eastern countries. Recently, Iraq has witnessed an outbreak of the Crimean-Congo Hemorrhagic Fever virus with high morbidity and mortality rates in humans. However, very little is known about the prevalence and distribution of CCHFV in Iraq, and therefore, it is impossible to quantify the risk of infection. CCHFV is transmitted to humans through the bite of infected ticks. However, transmission can also occur through contact with the blood or ti

... Show More
Preview PDF
Publication Date
Wed May 08 2024
Journal Name
Journal Of Mathematics And Computer Science
How does media coverage affect a COVID-19 pandemic model with direct and indirect transmission?
...Show More Authors

In this paper, a compartmental differential epidemic model of COVID-19 pandemic transmission is constructed and analyzed that accounts for the effects of media coverage. The model can be categorized into eight distinct divisions: susceptible individuals, exposed individuals, quarantine class, infected individuals, isolated class, infectious material in the environment, media coverage, and recovered individuals. The qualitative analysis of the model indicates that the disease-free equilibrium point is asymptotically stable when the basic reproduction number R0 is less than one. Conversely, the endemic equilibrium is globally asymptotically stable when R0 is bigger than one. In addition, a sensitivity analysis is conducted to determine which

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Mar 10 2024
Journal Name
Journal Of Optics
Optical signal transmission for the visible light communication system through the water–air interface link
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Evaluation Tv- Image Quality for Different Cable Signal Transmission Resistance Based on Contrast Edge Algorithm
...Show More Authors

Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Conference Proceedings
Assessing the accuracy of 'crowdsourced' data and its integration with official spatial data sets
...Show More Authors

Scopus (20)
Scopus