@atu.edu.iq
Al-Furat Al-Awsat Technical University
Scopus Publications
Ahmed Hassan Hadi, Sameer Hameed Abdulshaheed, and Salim Muhsen Wadi
Al-Muthanna 2nd International Conference on Engineering Science and Technology, MICEST 2022 - Proceedings IEEE
Encryption defined as change information process (which called plaintext) into an unreadable secret format (which called ciphertext). This ciphertext could not be easily understood by somebody except authorized parson. Decryption is the process to converting ciphertext back into plaintext. Deoxyribonucleic Acid (DNA) based information ciphering techniques recently used in large number of encryption algorithms. DNA used as data carrier and the modern biological technology is used as implementation tool. New encryption algorithm based on DNA is proposed in this paper. The suggested approach consists of three steps (conventional, stream cipher and DNA) to get high security levels. The character was replaced by shifting depend character location in conventional step, convert to ASCII and AddRoundKey was used in stream cipher step. The result from second step converted to DNA then applying AddRoundKey with DNA key. The evaluation performance results proved that the proposed algorithm cipher the important data with high security levels.
Ahmed Al Hilli, Mohanad Al-Ibadi, Ahmed M. Alfadhel, Sameer Hameed Abdulshaheed, and Ahmed Hassan Hadi
Expert Systems with Applications Elsevier BV
Abstract Finding the optimal path for a mobile robot in complex environments is a crucial part of automation. In this application, we seek a path that avoids obstacles inside the scene. This paper discusses the path planning problem in cases where 2D obstacles change their areas in stochastic form. The trade-off between shortness and safety of the path is captured by two objective functions: distance-based and risk-based objective functions. The Risk-based objective function describes how likely the suggested path avoids the obstacles. Particle swarm optimization (PSO) is employed to find the best path. A new set of parameters are introduced to the problem model to capture the stochastic nature of the environment. The range and behavior of these parameters are studied under different difficulty-level scenarios. The results show that the proposed approach can predict the stochastic changes in obstacles and plan a path that is simultaneously safe and short, as compared to the regular approach with a standard distance-only cost function. These results manifest the use of the proposed approach in environments where there are elastic objects that can block the path between two points.
Sameer H. Alibadi and Sattar B. Sadkhan
IEEE
The security level is very important in Bluetooth, because the network or devices using secure communication, are susceptible to many attacks against the transmitted data received through eavesdropping. The cryptosystem designers needs to know the complexity of the designed Bluetooth E0. And what the advantages given by any development performed on any known Bluetooth E0 Encryption method. The most important criteria can be used in evaluation method is considered as an important aspect. This paper introduce a proposed fuzzy logic technique to evaluate the complexity of Bluetooth E0 Encryption system by choosing two parameters, which are entropy and correlation rate, as inputs to proposed fuzzy logic based Evaluator, which can be applied with MATLAB system.