A Framework for Blockchain Based E-Voting System for Iraq DOI Open Access

Yousif Mohammed Wahab,

Alaan Ghazi, Aras Al-dawoodi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(10), С. 210 - 222

Опубликована: Май 24, 2022

Election is a basic democratic tool that offers an official mechanism for the people to express their opinions in order form government by means. Electronic voting has evolved into most significant application of e-governance and e-democracy. Few countries have recently taken opportunity test use electronic systems. Also, many expect internet will become reality during next decade. In conventional system, electors authenticate themselves displaying credentials; this move open public validated poll workers. During authentication, they are manually checked before being eligible vote. The standard system more costly needs human capital. Because these factors, whole world heading toward trend e-voting. devices supposed be answer shortages. A secure e-voting must meet criteria, including uniqueness, performance, fairness, stability, safety, anonymity. Blockchain modern security solution, which capable securing system. distributed ledger. Each block contains only one transaction. Block chain provides using cryptography hashing. perfect infrastructure provide netwms.ork. along with smart contracts need hour improvise This paper presents blockchain based framework e-electronic Iraq.

Язык: Английский

Secure Chaos of 5G Wireless Communication System Based on IOT Applications DOI Open Access
Haider TH. Salim ALRikabi, Hussein Tuama Hazim

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2022, Номер 18(12), С. 89 - 105

Опубликована: Сен. 14, 2022

This research is aimed at planning the manner in which secure 5G communication can be controlled based on traffic floods. To accomplish excellent administration execution of organization observing and directing calculation inescapable, dynamic steering actual equipment isn't reasonable for practical plans action. Accordingly, to bring down functional capital consumption, we propose a strategy called versatile made do with help (Quality Service MANET (Mobile specially appointed Network). A model will fulfilling needs customers simultaneously gives huge investment funds item cost convenience was presented this paper. perform steering, planned geography virtualized climate. We customized CHAOS network flood board goes about as consistent northward API directing. Network infused dynamically from 1MB up 10MB (connect b/w) progressive way similar 10 occurrences. In conclusion, performed applying control hypothetical method assistance calculations. By looking two situations, noticed prominent distinction throughput controlling application MANETs. data refreshed after clockwork.

Язык: Английский

Процитировано

69

A color image encryption and decryption scheme based on extended DNA coding and fractional-order 5D hyper-chaotic system DOI
Fanqi Meng, Gang Wu

Expert Systems with Applications, Год журнала: 2024, Номер 254, С. 124413 - 124413

Опубликована: Июнь 12, 2024

Язык: Английский

Процитировано

18

Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques DOI Open Access
Abdul Hadi M. Alaidi,

Roa’a M. Al airaji,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(10), С. 122 - 139

Опубликована: Май 24, 2022

Dark web is a canopy concept that denotes any kind of illicit activities carried out by anonymous persons or organizations, thereby making it difficult to trace. The content on the dark constantly updated and changed. collection classification such illegal are challenging tasks, as they time-consuming. This problem has in recent times emerged an issue requires quick attention from both industry academia. To this end, efforts have been made article crawler capable collecting pages, cleaning them, saving them document database, proposed. carries automatic gathered pages into five classes. classifiers used classifying include Linear Support Vector Classifier (SVC), Naïve Bayes (NB), Document Frequency (TF-IDF). experimental results revealed accuracy rate 92% 81% were achieved SVC NB, respectively.

Язык: Английский

Процитировано

63

Security Risks of the Metaverse World DOI Open Access
Tanya Abdulsattar Jaber

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(13), С. 4 - 14

Опубликована: Июль 11, 2022

An interesting paradigm is a metaverse which represents the next generation of using internet to improve human lives and provide new way communicate by building system that let user represented their avatar work, socialize play virtually integrating multiple technologies such as blockchain, artificial intelligence well virtual augmented reality. However, this may preserve many problems related security privacy starting from data breaches identity theft, in paper an overview world architecture connects real discuss main risks within Metaverse

Язык: Английский

Процитировано

59

Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique DOI Open Access

Raghad Abdulaali Azeez,

Mohammad K. Abdul-Hussein, Mohammed Salih Mahdi

и другие.

Periodicals of Engineering and Natural Sciences (PEN), Год журнала: 2021, Номер 10(1), С. 178 - 178

Опубликована: Дек. 30, 2021

Copyright is a tool for preventing anyone forged to copy an electronic work from another person and claim that referred him. Since the identity of always determined by his name biometrics, there concern handle this information, preserve copyright. In paper, new idea copyright technology used prove video copyright, using blind watermarking technique, ownership information hidden inside frames linear congruential generator (LCG) adapted locations vector features extracted biometric image owner instead watermark in Pseudo Noise sequences or any other feature extraction technique. When providing watermarked vector, statistical operation increase randomization state amplifier factors LCG function. provides random positions where owner's stored video. The proposed method not difficult execute can present adaptable imperceptibility robustness performance. output results show approach based on average PSNR embedded 50 around 47.5 dB while remains undetectable. MSSIM values with range (0.83 0.99).

Язык: Английский

Процитировано

55

Face Patterns Analysis and Recognition System Based on Quantum Neural Network QNN DOI Open Access
Haider TH. Salim ALRikabi,

Ibtisam A. Aljazaery,

Jaafar Sadiq Qateef

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(08), С. 34 - 48

Опубликована: Апрель 26, 2022

The past few years have witnessed a huge increase in the application of facial recognition, detection, and analysis technology. However, face recognition systems remain most popular among general public. system can detect presence when exposed to one. accuracy fairness that be derived from such necessitate their use, because humans, particularly security personnel tired target wrong person as suspect. artificial intelligence are properly trained capable efficiently identifying classifying faces without errors. In this work, use Matlab language was employed building software is recognizing differentiating different patterns. proposed equipped with camera serves practical aspect captures shots sent theoretical part special program designed recognize by comparing them database stored within program. work involved Quantum Neural Network. training dataset made up features vectors were obtained well-known set images people. Here, Principle Component Analysis (PCA) used for extraction feature then prepared next step. experimental results revealed efficient achieved through well-trained

Язык: Английский

Процитировано

43

Automated Cheating Detection based on Video Surveillance in the Examination Classes DOI Open Access

Roa’a M. Al airaji,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(08), С. 124 - 137

Опубликована: Апрель 26, 2022

A major issue in the field of education is exam malpractice and other forms academic dishonesty, where efforts made towards assessment students are undercut. In order to address this menace, a cheating detection system has been proposed study. The can detect real-time. uses video surveillance monitor activities student during exams, especially abnormal behavior. development involved use three different techniques, with functions. first technique helps determining direction students’ heads when they move from their initial direction, which script. Some form involves peeping at scripts people writing same exam. Whenever observes deviation that exceeds set threshold, it classifies behavior as abnormal. second works movement student’s iris. It detects iris moves copy answers written documents like mobile phones, books, hands, summary papers. third used identifying contact between hands face, well for shared students, such sharing incriminating materials. When any these detected, an automatic alarm alerts authority about thereby minimizing error rate occur result manual monitoring.

Язык: Английский

Процитировано

29

Secured Transfer and Storage Image Data for Cloud Communications DOI Open Access
Mohammad K. Abdul-Hussein, Haider TH. Salim ALRikabi

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2023, Номер 19(06), С. 4 - 17

Опубликована: Май 16, 2023

In cloud computing, resources are used to communicate instead of local servers or individual devices. However, sharing among several users is a difficult issue in communication. Cryptography and steganography techniques for storage address data security challenges. This paper presents novel method securely encrypting image transmission link exchange with service. There two phases accomplish the encryption process, first phase encrypts file by XORing it random key that generated new hybrid chaotic map. The second converts encrypted format audio add another layer improve secure transfer. using map has benefit having more than 10256 spaces necessary level security. Based on statistical analysis encryption, quality evaluated criteria, results demonstrate algorithm's ability resist

Язык: Английский

Процитировано

20

Gender Recognition of Human from Face Images Using Multi-Class Support Vector Machine (SVM) Classifiers DOI Open Access
Mohammed Jawad Al Dujaili, Haider TH. Salim ALRikabi, Nisreen Khalil Abed

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(08), С. 113 - 134

Опубликована: Апрель 26, 2023

In the realm of robotics and interactive systems, gender recognition is a crucial problem. Considering several uses it has in security, web search, human-computer interactions, etc., from facial photos garnered lot attention. The need to use enhance techniques felt more strongly today due significant development design systems. Relatively speaking other approaches, progress gained this area thus far not exceptional. Thus, novel method been adopted study improve accuracy comparison earlier research. To create best rate efficiency suggested research, we choose minimal set characteristics. Testing on FERET UTK-Face datasets reveals that our algorithm lower degree inaccuracy. article, input image person's face pre-processed extract right features once recognized. Gender separation achieved using Multi-class Support Vector Machine (SVM) Classifiers after normalized images have extracted Histogram Oriented Gradient (HOG), Gabor Filters, Speeded Up Robust Features (SURF), as well their combination select most appropriate feature them for classification. As reduction feature, Principal Component Analysis (PCA) also employed. Using proposed approach, 98.75% precision accomplished database runtime performance 0.4 Sec. database, 97.43% 0.5

Язык: Английский

Процитировано

17

Hiding Information in Digital Images Using LSB Steganography Technique DOI Open Access
Sabah Abdulazeez Jebur, Abbas Khalifa Nawar,

Lubna Emad Kadhim

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(07), С. 167 - 178

Опубликована: Апрель 5, 2023

The highest way to protect data from intruder and unauthorized persons has become a major issue. This matter led the development of many techniques for security, such as Steganography, Cryptography, Watermarking disguise data. paper proposes an image steganography method using Least Significant Bits (LSB) technique XOR operator secret key, through which key is transformed into one-dimensional bit stream array, then these bits are XORed with image. Multiple experiments have been performed embed color grayscale images inside cover media. In this work, LSB ideal in two ways: firstly, only least significant one-bit (1bit) each byte will store embedded data, named (1-LSB). Secondly, four right half-byte (4 bits) (4-LSB). Subjective objective analyzes were process. subjective analysis responsible both HVS histogram, whereas involved PSNR MSE metrics.

Язык: Английский

Процитировано

15