Zaid Ameen Abduljabbar
University of Basrah

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 6 Documents
Search

Model to enhance knowledge sharing process in academia during COVID-19 Zainab Amin Alsulami; Hayder Salah hashim; Zaid Ameen Abduljabbar
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3543

Abstract

Knowledge sharing (KS) is considered one of the essential processes of knowledge management (KM). Recently, the emerging Web 2.0 technologies were used by academicians and students for KS during the COVID-19 pandemic. The purpose of this study is to identify the factors that affect the knowledge-sharing process through Web 2.0 (KSWT 2.0) technologies and their impact on academic performance within higher educational institutions (HEIs) in Iraq. The technology-organization-environment (TOE) theory was used in this study to develop the conceptual framework. The population includes students and academicians at Basrah University in Iraq. Using stratified random sampling, a total of 415 academicians and students participated in this study. The results revealed that the most significant factors that positively affect KSWT 2.0 technologies were the technological factor such as relative advantage, compatibility. From the organisational factor academicians’ skills and knowledge, and from environmental factor, the peer pressure. In addition, the results proved that the KSWT 2.0 technologies positively maximised academic performance. The results presented in this study are valuable for Iraqi universities that implement or aim to use Web 2.0 technologies in the knowledge-sharing process.
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling Enas Wahab Abood; Abdulhssein M. Abdullah; Mustafa A. Al Sibahe; Zaid Ameen Abduljabbar; Vincent Omollo Nyangaresi; Saad Ahmad Ali Kalafy; Mudhafar Jalil Jassim Ghrabta
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3279

Abstract

Data security pressing issue, particularly in terms of ensuring secure and reliable data transfer over a network. Encryption and seganography play a fundamental role in the task of securing data exchanging. In this article, both steganography and cryptography were combined to produce a powerful hybrid securing stego-system. Firstly, a text message is encrypted with a new method using a bits cycling operation to give a cipher text. In the second stage, an enhanced LSB method is used to hide the text bits randomly in an audio file of a wav format. This hybrid method can provide effectually secure data. Peak signal-to-noise ratio (PSNR), mean squared error (MSE) and structural similarity (SSIM) were employed to evaluate the performance of the proposed system. A PSNR was in range (60-65) dB with the enhanced least significant bit (LSB) and the SSIM had been invested to calculate the signal quality, which scored 0.999. The experimental results demonstrated that our algorithm is highly effective in securing data and the capacity size of the secured text. Furthermore, the time consumption was considerably low, at less than 0.3 seconds.
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud Salah H. Abbdal; Thair A. Kadhim; Zaid Ameen Abduljabbar; Zaid Alaa Hussien; Ali A. Yassin; Mohammed Abdulridha Hussain; Salam Waley
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp452-460

Abstract

Cloud computing is a novel paradigm that allows users to remotely access their data through web- based tools and applications. Later, the users do not have the ability to monitor or arrange their data. In this case, many security challenges have been raised. One of these challenges is data integrity. Contentiously, the user cannot access his data directly and he could not know whether his data is modified or not. Therefore, the cloud service provider should provide efficient ways for the user to ascertain whether the integrity of his data is protected or compromised. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. Additionally, we propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the iris feature extraction and digital signature.  Iris recognition has become a new, emergent approach to individual identification in the last decade. It is one of the most accurate identity verification systems. This technique gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user’s iris features to secure and integrate data in a manner difficult for any internal or external unauthorized entity to take or compromise it. Iris recognition is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane. Extensive security and performance analysis show that our proposed scheme is highly efficient and provably secure.
Securing audio transmission based on encoding and steganography Enas Wahab Abood; Zaid Ameen Abduljabbar; Mustafa A. Al Sibahee; Mohammed Abdulridha Hussain; Zaid Alaa Hussien
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1777-1786

Abstract

One of the things that must be considered when establishing a data exchange connection is to make that communication confidential and hide the file’s features when the snoopers intercept it. In this work, transformation (encoding) and steganography techniques are invested to produce an efficient system to secure communication for an audio signal by producing an efficient method to transform the signal into a red–green–blue (RGB) image. Subsequently, this image is hidden in a cover audio file by using the least significant bit (LSB) method in the spatial and transform domains using discrete wavelet transform. The audio files of the message and the cover are in *.wav format. The experimental results showed the success of the transformation in concealing audio secret messages, as well the remarkability of the stego signal quality in both techniques. A peak signal-to-noise ratio peak signal-to-noise ratio (PSNR) scored (20-26) dB with wavelet and (81-112) dB with LSB for cover file size 4.96 MB and structural similarity index metric structural similarity index metric (SSIM) has been used to measure the signal quality which gave 1 with LSB while wavelet was (0.9-1), which is satisfactory in all experimented signals with low time consumption. This work also used these metrics to compare the implementation of LSB and WAV.
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment Zainab Amin Al-Sulami; Hayder Salah Hashim; Nor’ashikin Ali; Zaid Ameen Abduljabbar
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1680-1688

Abstract

The concept of knowledge management (KM) and organizational learning (OL) has been embraced by organizations to complement each other. Higher education institutions have embraced KM and OL as a means to improve organizational efficiency. This research explores the link between KM and OL. The target population included all the 432 academicians and administrators from 35 public universities in Iraq. The sampling was selected using a stratified random sampling technique. The correlation among the components of KM and OL was tested as well as the effect of KM components on OL. The findings were derived using smart partial least square. The findings showed that there is significant correlation between components of KM and components of OL. The regression analysis showed also that the effect of KM and its components; knowledge creation, knowledge sharing, knowledge storage, knowledge application and knowledge acquisition on OL are significant. These findings provide insights to universities management on strategies to implement KM practices that can align with OL practices to assure dynamic lifelong mechanisms for the basic daily activities such as teaching, learning, researching, and supervision.
Provably secure and efficient audio compression based on compressive sensing Enas Wahab Abood; Zaid Alaa Hussien; Haifaa Assy Kawi; Zaid Ameen Abduljabbar; Vincent Omollo Nyangaresi; Junchao Ma; Mustafa A. Al Sibahee; Saad Ahmad Ali Kalafy
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i1.pp335-346

Abstract

The advancement of systems with the capacity to compress audio signals and simultaneously secure is a highly attractive research subject. This is because of the need to enhance storage usage and speed up the transmission of data, as well as securing the transmission of sensitive signals over limited and insecure communication channels. Thus, many researchers have studied and produced different systems, either to compress or encrypt audio data using different algorithms and methods, all of which suffer from certain issues including high time consumption or complex calculations. This paper proposes a compressing sensing-based system that compresses audio signals and simultaneously provides an encryption system. The audio signal is segmented into small matrices of samples and then multiplied by a non-square sensing matrix generated by a Gaussian random generator. The reconstruction process is carried out by solving a linear system using the pseudoinverse of Moore-Penrose. The statistical analysis results obtaining from implementing different types and sizes of audio signals prove that the proposed system succeeds in compressing the audio signals with a ratio reaching 28% of real size and reconstructing the signal with a correlation metric between 0.98 and 0.99. It also scores very good results in the normalized mean square error (MSE), peak signal-to-noise ratio metrics (PSNR), and the structural similarity index (SSIM), as well as giving the signal a high level of security.