Imad S. Alshawi
University of Basrah

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 6 Documents
Search

Automatic sound synthesis using the fly algorithm Zainab A. Abbood; Imad S. Alshawi; Asaad A. Alhijaj; Franck P. Vidal
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.15665

Abstract

Our study is demonstrated a new type of evolutionary sound synthesis method. This work based on the fly algorithm, a cooperative co-evolution algorithm; it is derived from the Parisian evolution approach. The algorithm has relatively amended the position of individuals (the Flies) represented by 3-D points. The fly algorithm has successfully investigated in different applications, starting with a real-time stereo vision for robotics. Also, the algorithm shows promising results in tomography to reconstruct 3-D images. The final application of the fly algorithm was generating artistic images, such as digital mosaics. In all these applications, the flies’representation started for simple, 3-D points, to complex one, the structure of 9-elements. Our method follows evolutionary digital art with the fly algorithm in representing the pattern of the flies. They represented in a way of having their structure. This structure includes position, colour, rotation angle, and size. Our algorithm has the benefit of graphics processing units (GPUs) to generate the sound waveform using the modern OpenGL shading language.
Fuzzy dstar-lite routing method for energy-efficient heterogeneous wireless sensor networks Imad S. Alshawi; Abdul-Kareem Y. Abdulla; Asaad A. Alhijaj
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i2.pp906-916

Abstract

Sensor devices, in wireless sensor networks (WSNs), are usually equipped with low-capacity batteries and scattered on areas that cannot be reached in most of the cases to recharge or replace these sensors. The available battery energy in the sensor nodes is barely sufficient to transmit a limited quantity of data packets. In this regard, most of the works are designed aiming at achieving high energy efficiency. Due to multiple-hop data transmission and many to one traffic connection, the Imbalanced energy depletion (IED) is an immanent issue in WSNs. Accordingly, this paper suggests an energy efficient routing protocol called fuzzy dstar-lite to produce an optimal pathway data routing for Heterogeneous WSNs (HWSNs). This protocol can also reuse the product path to keep the energy consumption fairly distributed over the nodes of a network. Interestingly, the proposed protocol is demonstrated to be more efficient in decreasing the transmission delay and balancing power consumption when compared with other protocols, i.e. chessboard clustering (CC), PEGASIS, and LEACH. The comparison also showed the proposed protocol has been increased the network lifetime approximately 15%, 40%, and 50% compare with CC, PEGASIS, and LEACH, respectively.
Fuzzy spider monkey optimization routing protocol to balance energy consumption in heterogeneous wireless sensor networks Khalid Hameed Zaboon; Nagham Mumtaz Kudhair; Imad S. Alshawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i2.pp921-930

Abstract

Wireless sensor network (WSN) nodes have high computation limitations, limited communication capabilities, and limited power resources because of the difficulty or impossibility of replacing or recharging the sensor battery. Energy consumption in nodes is a critical issue to consider while developing WSNs. Many routing protocols are proposed for energy conservation as an important goal for improvement. Nonetheless, just delivering energy is not enough to prolong the life of a WSN. Unbalanced energy depletion is a significant problem in WSNs, often resulting in network splits and a reduction in network lifetime, as well as performance retrogression. This article, therefore, proposes a robust protocol called the fuzzy spider monkey optimization routing protocol (FSMORP) to determine the best data path routing for heterogeneous WSNs (HWSNs). In this case, an FSMORP computes the best path across the cluster heads from a sensor to the sink. This work uses the clustering method to organize heterogeneous nodes in HWSNs. The simulation result indicates that the FSMORP considerably enhances data latency reduction, energy balancing, and lifetime maximization for the network.
Energy-efficient routing protocol in wireless sensor networks based on bacterial foraging optimization Abdulmalik Adil Abdulzahra; Baida’a Abdul Qader Khudor; Imad S. Alshawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i2.pp911-920

Abstract

Reserve the wireless sensor networks (WSNs) lifetime for as long as possible is a current goal. In WSNs, sensors are often limited in power. However, uneven power consumption (UPC) reduces lifetime, and its deterioration is considered one of the most critical problems. Therefore, balancing the energy consumption is a significant issue in the WSN, necessitating a routing protocol that is energy-efficient that extends the life of the network. A few protocols have been used to balance energy use across network nodes. This paper proposed a routing protocol energy-saving called Bacterial foraging optimization routing protocol (BFORP). BFORP attempts to investigate the problem of the life of WSNs. It can decrease the routing of excessive messages that may result in severe energy waste by recycling the information that frequents the source node into the sink. In the proposed method, the preferable node in the sending routes may be chosen by prioritizing the lowest traffic load, the highest residual energy, and the shortest path to the sink. In comparison to the known protocols used in routing, the results of the simulation have proven the efficacy of the suggested protocol in lowering energy employment and reducing the delay of end-to-end.
A hybrid modified lightweight algorithm for achieving data integrity and confidentiality Lamia A. Muhalhal; Imad S. Alshawi
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i1.pp833-841

Abstract

Encryption algorithms aim to make data secure enough to be decrypted by an attacker. This paper combines the Speck and the Salsa20 to make it difficult for an attacker to exploit any weaknesses in these two algorithms and create a new lightweight hybrid algorithm called Speck-Salsa20 algorithm for data integrity and confidentiality (SSDIC). SSDIC uses less energy and has an efficient throughput. It works well in both hardware and software and can handle a variety of explicit plaintext and key sizes. SSDIC solves the difficulties of the Speck algorithm. The sequence generated by Speck is not random and fails to meet an acceptable success rate when tested in statistical tests. It is processed by generating a random key using the Salsa20 algorithm. Salsa20 is a high-speed secure algorithm that is faster than advanced encryption standard (AES) and can be used on devices with low resources. It uses a 256-bit key hash function. The recovery of the right half of the original key of the Speck algorithm is also handled by modifying the Speck round function and the key schedule. Simulation results show, according to a National Institute of Standards and Technology (NIST) test, the performance achieved by the SSDIC is increased by nearly 66% more than that achieved from the Speck in terms of data integrity and confidentiality.
Efficient and secure hybrid chaotic key generation for light encryption device block cipher Hussain M. Al-Saadi; Imad S. Alshawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp1032-1040

Abstract

Lightweight cryptographic algorithms must develop to ensure the confidentiality and integrity of the data in resource-constrained devices. Keys are vital to every cryptography algorithm because they provide randomness, complexity, unexpected nature, and robustness. A light encryption device (LED) is considered a lighter version of advanced encryption standard (AES), but it is vulnerable to related key attacks due to using the same key during the whole encryption process. This paper presents a hybrid chaotic key generator (HCKG) based on 3D Lorenz, and 2D Henon maps to generate a highly randomized key that combines with the LED to provide a high level of secure encryption on resource-constrained devices. We modified the HCKG every four rounds via simple operations to get the subkeys and XORed it with the state to increase the complexity of the ciphertext. Moreover, the HCKG with subkeys allows us to decrease the total number of LED rounds from 32 to 24 to minimize the calculation cost while maintaining a high level of security. National Institute of Science and Technology (NIST) test suite proves that the proposed LED-HCKG demonstrates a high-performance increase by nearly 0.3283 higher than LED concerning data integrity and secrecy.