Abbas Akram Khorsheed
Mustansiriyah University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Open network structure and smart network to sharing cybersecurity within the 5G network Aseel K. Ahmed; Abbas Akram Khorsheed
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 1: July 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i1.pp573-582

Abstract

The next-generation communication system incorporates information technology (IT) and operations technology (OT) for generating, delivering, and collecting, and obtaining communication power. We plan to include a brief outline of internet of thing (IoT) communication and its context, along with security concerns that arise for IoT data on the network and some methods for detecting and avoiding cyber security threats. With the rise of the 5G networks, we introduce the smart network's emergent technology and its opportunities and more cybersecurity issues. Whereas, finding or responding to a power outage is an essential part of system security That is why we will discuss the innumerable advantages of 5G networks and we must also cover the inevitable problems that we will encounter in power delivery. The use of smart IoT communication technologies is becoming more common in the energy sector, particularly with the network (5G. The smart network and energy flow integration Real-time data on generation, electricity distribution, and energy consumption is measured using computers and cutting-edge technologies. This information aids utility companies in managing electricity supply and demand, as well as price. While enhanced communication and information technologies are unquestionably crucial to the smart network.
Biometric key generation using crow algorithm Zied O. Ahmed; Abbas Akram Khorsheed
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp208-214

Abstract

The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt to build robust cryptographic keys, because, human users detect difficulties to call up long cryptographic keys. Biometric recognition provides an authentic solution to the authentication of the user problem in the identity administration systems. With the extensive utilization of biometric methods in different applications, there is growing concern about the confidentiality and security of the biometric technologies. This paper proposes biometric based key recreation scheme. Since human ears are not correlated. Until now, the encryption keys are generated using a swarm intelligence approach. Collective intelligence of simple groups of autonomous agents have been emerged by swarm intelligence. The crow search algorithm which is known as (CSA) is a new meta-intuitive method assembled by the intelligent group behavior of crows. Despite that CSA demonstrates important features, its search approach poses excessive challenges while faced with great multimodal formularization.