Yazar "Mahmood, Musaria Karim" seçeneğine göre listele
Listeleniyor 1 - 6 / 6
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe A Comprehensive Analysis of Energy Dissipation in LEACH Protocol for Wireless Sensor Networks(IEEE, 2021) Fadhel, Hajer Faris; Mahmood, Musaria Karim; Al-Omari, OsamaWireless Sensor Networks (WSNs) are deployed over a specific area to monitor a range of environmental and physical phenomena. WSNs are known by their limitation in term of energy, memory, and computing capability. Therefore, these sensors need effective wireless communication protocols in terms of energy efficiency, ease of deployment, and low latency. LEACH is the principle routing algorithm adopted today for WSN data transmission. It is the origin of a variety of self-organizing clustering-based routing protocol. Data communication is the main source of energy losses beside but to a lesser extent data processing. The actual research is a step by step follow of LEACH focusing into the energy dissipation in various stages. The simulation of the protocol is accomplished through a MATLAB implementation to clarify the dissipation process. Nodes die after the residual energy has reached a minimum allowed threshold necessary for sensor functionality as part of the WSN. LEACH shows good performances but requires improvement in the cluster head selection stage by the use optimization techniques.Öğe Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications(Institute of Electrical and Electronics Engineers Inc., 2022) Darman, Ijaz; Mahmood, Musaria Karim; Chaudhry, Shehzad Ashraf; Khan, Sajjad Ahmad; Lim, HuhnkukIn the Sixth Generation (6G) mobile system, the importance of security increases even more in the communication system. One of the potential technologies of 6G is the Network in a Box (NIB). The 6G-enabled NIB is a multi-generational, easily and quickly installable technology used for communication. It is based on both hardware and software. The main features of a 6G-enabled NIB include low latency and a high level of flexibility. In addition, it provides connectivity services to the applications used in unusual situations such as battlefields or natural disasters in the industry. However, most of the applications used in the 6G-enabled NIB are not appropriately secured. There are chances of several active and passive attacks due to the insecure channel. Therefore, a novel remote user authentication and key management scheme is presented in this paper. This scheme is the modified and improved version of UAKMS-NIB and is renamed as the improved User Authentication and Management Scheme to secure the 6G-enabled NIB (iUAKMS-NIB) that can be used in industrial applications. Hence, the proposed scheme provides the best security solution against the possible attacks on the 6G communication system. The analytical results show that the proposed scheme performs better compared to the existing schemes. © 2013 IEEE.Öğe Drone Movement Control by Electroencephalography Signals Based on BCI System(VSB-TECHNICAL UNIV OSTRAVA, 17 LISTOPADU 15, OSTRAVA 70833, CZECH REPUBLIC, 2022) Abdulwahhab, Ali Hussein; Myderrizi, Indrit; Mahmood, Musaria KarimBrain Computer Interface enables individuals to communicate with devices through ElectroEncephaloGraphy (EEG) signals in many applications that use brainwave-controlled units. This paper presents a new algorithm using EEG waves for controlling the movements of a drone by eye-blinking and attention level signals. Optimization of the signal recognition obtained is carried out by classifying the eyeblinking with a Support Vector Machine algorithm and converting it into 4-bit codes via an artificial neural network. Linear Regression Method is used to categorize the attention to either low or high level with a dynamic threshold, yielding a 1-bit code. The control of the motions in the algorithm is structured with two control layers. The first layer provides control with eye-blink signals, the second layer with both eye-blink and sensed attention levels. EEG signals are extracted and processed using a single channel NeuroSky MindWave 2 device. The proposed algorithm has been validated by experimental testing of five individuals of different ages. The results show its high performance compared to existing algorithms with an accuracy of 91.85 % for 9 control commands. With a capability of up to 16 commands and its high accuracy, the algorithm can be suitable for many applications.Öğe Hybrid algorithm for two-terminal reliability evaluation in communication networks(Institute of Advanced Engineering and Science, 2020) Mahmood, Musaria Karim; Ucan, Osman; Zaidan, Zahraa; Karim, Sulaiman M.Network reliability is valuable in establishing a survivable communication network. Reliability evaluation algorithms are used in the design stage and during the network deployment. This work presents a new multistage hybrid technique for two-terminal reliability evaluation problem. It is based on a combination of graph reduction techniques and tie-set method. A new approach has been introduced for deducing tie-sets in a network containing both unidirectional and bi-directional edges. The proposed algorithm can be applied for both simple and complex networks without restrictions. The results confirm that new algorithm evaluates network's reliability with decreasing computing time compared to classical algorithms. The results for a case study of a 20-node network have demonstrated that the required time for reliability evaluation is decreased from (t>1 hour) in the case of using a classical algorithm, to (t<1 second) for the new algorithm. © 2021 Institute of Advanced Engineering and Science. All rights reserved.Öğe Optimization of Head Cluster Selection in WSN by Human-Based Optimization Techniques(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022) Fadhel, Hajer Faris; Mahmood, Musaria Karim; Alomari, Osama Ahmad; Elnagar, AshrafWireless sensor networks (WSNs) are characterized by their ability to monitor physical or chemical phenomena in a static or dynamic location by collecting data, and transmit it in a collaborative manner to one or more processing centers wirelessly using a routing protocol. Energy dissipation is one of the most challenging issues due to the limited power supply at the sensor node. All routing protocols are large consumers of energy, as they represent the main source of energy cost through data exchange operation. Clusterbased hierarchical routing algorithms are known for their good performance in energy conservation during active data exchange in WSNs. The most common of this type of protocol is the Low-Energy Adaptive Clustering Hierarchy (LEACH), which suffers from the problem of the pseudo-random selection of cluster head resulting in large power dissipation. This critical issue can be addressed by using an optimization algorithm to improve the LEACH cluster heads selection process, thus increasing the network lifespan. This paper proposes the LEACH-CHIO, a centralized cluster-based energyaware protocol based on the Coronavirus Herd Immunity Optimizer (CHIO) algorithm. CHIO is a newly emerging human-based optimization algorithm that is expected to achieve significant improvement in the LEACH cluster heads selection process. LEACH-CHIO is implemented and its performance is verified by simulating different wireless sensor network scenarios, which consist of a variable number of nodes ranging from 20 to 100. To evaluate the algorithm performances, three evaluation indicators have been examined, namely, power consumption, number of live nodes, and number of incoming packets. The simulation results demonstrated the superiority of the proposed protocol over basic LEACH protocol for the three indicators.Öğe Secure and Fast Encryption Routine+: Evaluation by Software Application(İstanbul Gelişim Üniversitesi Yayınları / Istanbul Gelisim University Press, 2020) Şahin, M. Faruk; Mahmood, Musaria Karim; Myderrizi, IndritNowadays, the Internet era and its components are based on the collection, exchange, and storage of information which represent a sever security concern. Many cipher algorithms have been developed, evaluated, and implemented to increase the protection of data for various applications. The most known strategy of data securing has been the implementation of symmetrical key encryption standards. Secrecy, robustness, reliability, and software/ hardware implementation, are among the most important properties of good cipher standard. In this work, text, data and image encryption/decryption are performed by a MATLAB software implementation of the symmetric key block standard realized using the Secure and Fast Encryption Routine (SAFER+) algorithm with 128 key length option. The results show good performances in encryption/ decryption speed through a set of original procedures to simplify the achievement of nonlinear functions adopted by SAFER+ structure.