Ali Abdulwahhab Mohammed
Al-Karkh University of Science

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analysis of threats and security issues evaluation in mobile P2P networks Ali Abdulwahhab Mohammed; Dheyaa Jasim kadhim
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v10i6.pp6435-6445

Abstract

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
Face detection and recognition with 180 degree rotation based on principal component analysis algorithm Assad H. Thary Al-Ghrairi; Ali Abdulwahhab Mohammed; Esraa Zuhair Sameen
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 11, No 2: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v11.i2.pp593-602

Abstract

This paper presents a simple and fast recognition system with various facial expressions, poses, and rotation. The proposed system performed in two phases. Face detection is the first phase. The front and profile face detected cropped face area from the image by Viola-Jones algorithm and the right side face is detected from the image by taking the flip of the profile image. Principal component analysis (eigenfaces) algorithm is used in the recognition phase and depends on created database models used to be compared with test face image input to the recognition procedure. For training and testing the system, two sets of the image of the file exchange interface (FEI) database have been used to identify the person. The experimental result shows the effectiveness and robustness of the method used for the detection of the face and achieves high accuracy of 96%, which improves the recognition performance with low execution time. Furthermore, the accuracy of 35 trained images for recognition is 97.143% with average time execution which is (0.323657s). Also, the accuracy of 15 tested images for recognition is 93.315% with average time execution which is (0.3348s) which indicates a good and strong success and accuracy method for facial recognition.
Proposed emerged and enhanced routing protocols for wireless networks Dheyaa Jasim Kadhim; Ali Abdulwahhab Mohammed
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i2.pp871-879

Abstract

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as DS-ZRP routing protocol. The third proposed routing protocol is designed based on using the advantaged of multipoint relays in OSLR protocol with the advantages of route cashing in DSR protocol, and we named it as OLS-DSR routing protocol. Then, some experimental tests are doing by demonstration case studies and the experimental results proved that our proposed routing protocols outperformed than current wireless routing protocols in terms of important network performance metrics such as periodical broadcast, network control overhead, bandwidth overhead, energy consumed and latency.