Israa Al_Barazanchi
Baghdad College of Economic Sciences University

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

Mitigation of packet loss with end-to-end delay in wireless body area network applications Suha Sahib Oleiwi; Ghassan N. Mohammed; Israa Al_Barazanchi
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp460-470

Abstract

The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN technology as a problem of reducing network lifetime; thus, in this paper, we utilize cooperative routing protocol (CRP) to improve package delivery via end-to-end latency and increase the length of the network lifetime. The end-to-end latency was used as a metric to determine the significance of CRP in WBAN routing protocols. The CRP increased the rate of transmission of packets to the sink and mitigate packet loss. The proposed solution has shown that the end-to-end delay in the WBAN is considerably reduced by applying the cooperative routing protocol. The CRP technique attained a delivery ratio of 0.8176 compared to 0.8118 when transmitting packets in WBAN.
Efficient time-series forecasting of nuclear reactions using swarm intelligence algorithms Hala Shaker Mehdy; Nariman Jabbar Qasim; Haider Hadi Abbas; Israa Al_Barazanchi; Hassan Muwafaq Gheni
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5093-5103

Abstract

In this research paper, we focused on the developing a secure and efficient time-series forecasting of nuclear reactions using swarm intelligence (SI) algorithm. Nuclear radioactive management and efficient time series for casting of nuclear reactions is a problem to be addressed if nuclear power is to deliver a major part of our energy consumption. This problem explains how SI processing techniques can be used to automate accurate nuclear reaction forecasting. The goal of the study was to use swarm analysis to understand patterns and reactions in the dataset while forecasting nuclear reactions using swarm intelligence. The results obtained by training the SI algorithm for longer periods of time for predicting the efficient time series events of nuclear reactions with 94.58 percent accuracy, which is higher than the deep convolution neural networks (DCNNs) 93% accuracy for all predictions, such as the number of active reactions, to see how the results can improve. Our earliest research focused on determining the best settings and preprocessing for working with a certain nuclear reaction, such as fusion and fusion task: forecasting the time series as the reactions took 0-500 ticks being trained on 300 epochs
Proposed system for data security in distributed computing in using ‎triple data encryption standard and ‎Rivest Shamir ‎Adlemen Shihab A. Shawkat; Bilal A. Tuama; Israa Al_Barazanchi
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6496-6505

Abstract

Cloud computing is considered a distributed computing paradigm in which resources ‎are ‎provided as services. In cloud computing, the ‎applications do not run ‎from a user’s personal computer but are run and stored on distributed ‎servers on the Internet. The ‎resources of the cloud infrastructures are shared on cloud ‎computing on the Internet in the open ‎environment. This increases the security problems in ‎security such as data confidentiality, data ‎integrity and data availability, so the solution of such ‎problems are conducted by adopting data ‎encryption is very important for securing users data. ‎In this paper, a comparative ‎study is done between the two security algorithms on a cloud ‎platform called eyeOS. From the ‎comparative study it was found that the Rivest Shamir ‎Adlemen ‎(3kRSA) algorithm ‎outperforms that triple data encryption standard (3DES) algorithm with ‎respect to the complexity, and output bytes. The main ‎drawback of the 3kRSA algorithm is its ‎computation time, while 3DES is faster than that ‎‎3kRSA. This is useful for storing large amounts of ‎data used in the cloud computing, the key ‎distribution and authentication of the asymmetric ‎encryption, speed, data integrity and data ‎confidentiality of the symmetric encryption are also ‎important also it enables to execute ‎required computations on this encrypted data.‎
A secure sharing control framework supporting elastic mobile cloud computing Aws Hamed Hamad; Adnan Yousif Dawod; Mohammed Fakhrulddin Abdulqader; Israa Al_Barazanchi; Hassan Muwafaq Gheni
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2270-2277

Abstract

In elastic mobile cloud computing (EMCC), mobile devices migrate some computing tasks to the cloud for execution according to current needs and seamlessly and transparently use cloud resources to enhance their functions. First, based on the summary of existing EMCC schemes, a generic EMCC framework is abstracted; it is pointed out that the migration of sensitive modules in the EMCC program can bring security risks such as privacy leakage and information flow hijacking to EMCC; then, a generic framework of elastic mobile cloud computing that incorporates risk management is designed, which regards security risks as a cost of EMCC and ensures that the use of EMCC is. Finally, it is pointed out that the difficulty of risk management lies in risk quantification and sensitive module labeling. In this regard, risk quantification algorithms are designed, an automatic annotation tool for sensitive modules of Android programs is implemented, and the accuracy of the automatic annotation is demonstrated through experiments.