Sameer Hameed Abdulshaheed

@atu.edu.iq

Al-Furat Al-Awsat Technical University

3

Scopus Publications

Scopus Publications

  • Safeguard Algorithm by Conventional Security with DNA Cryptography Method
    Ahmed Hassan Hadi, Sameer Hameed Abdulshaheed, and Salim Muhsen Wadi

    Al-Muthanna 2nd International Conference on Engineering Science and Technology, MICEST 2022 - Proceedings IEEE
    Encryption defined as change information process (which called plaintext) into an unreadable secret format (which called ciphertext). This ciphertext could not be easily understood by somebody except authorized parson. Decryption is the process to converting ciphertext back into plaintext. Deoxyribonucleic Acid (DNA) based information ciphering techniques recently used in large number of encryption algorithms. DNA used as data carrier and the modern biological technology is used as implementation tool. New encryption algorithm based on DNA is proposed in this paper. The suggested approach consists of three steps (conventional, stream cipher and DNA) to get high security levels. The character was replaced by shifting depend character location in conventional step, convert to ASCII and AddRoundKey was used in stream cipher step. The result from second step converted to DNA then applying AddRoundKey with DNA key. The evaluation performance results proved that the proposed algorithm cipher the important data with high security levels.

  • Optimal path finding in stochastic quasi-dynamic environments using particle swarm optimization
    Ahmed Al Hilli, Mohanad Al-Ibadi, Ahmed M. Alfadhel, Sameer Hameed Abdulshaheed, and Ahmed Hassan Hadi

    Expert Systems with Applications Elsevier BV
    Abstract Finding the optimal path for a mobile robot in complex environments is a crucial part of automation. In this application, we seek a path that avoids obstacles inside the scene. This paper discusses the path planning problem in cases where 2D obstacles change their areas in stochastic form. The trade-off between shortness and safety of the path is captured by two objective functions: distance-based and risk-based objective functions. The Risk-based objective function describes how likely the suggested path avoids the obstacles. Particle swarm optimization (PSO) is employed to find the best path. A new set of parameters are introduced to the problem model to capture the stochastic nature of the environment. The range and behavior of these parameters are studied under different difficulty-level scenarios. The results show that the proposed approach can predict the stochastic changes in obstacles and plan a path that is simultaneously safe and short, as compared to the regular approach with a standard distance-only cost function. These results manifest the use of the proposed approach in environments where there are elastic objects that can block the path between two points.

  • A Proposed Security Evaluation Method for Bluetooth E <inf>0</inf> Based on Fuzzy Logic
    Sameer H. Alibadi and Sattar B. Sadkhan

    IEEE
    The security level is very important in Bluetooth, because the network or devices using secure communication, are susceptible to many attacks against the transmitted data received through eavesdropping. The cryptosystem designers needs to know the complexity of the designed Bluetooth E0. And what the advantages given by any development performed on any known Bluetooth E0 Encryption method. The most important criteria can be used in evaluation method is considered as an important aspect. This paper introduce a proposed fuzzy logic technique to evaluate the complexity of Bluetooth E0 Encryption system by choosing two parameters, which are entropy and correlation rate, as inputs to proposed fuzzy logic based Evaluator, which can be applied with MATLAB system.