Ali Makki Sagheer

ORCID: 0000-0003-2589-5317
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Cryptography and Data Security
  • Coding theory and cryptography
  • Advanced Steganography and Watermarking Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Cryptography and Residue Arithmetic
  • Digital Media Forensic Detection
  • Brain Tumor Detection and Classification
  • Advanced Data Compression Techniques
  • Advanced Malware Detection Techniques
  • Energy Efficient Wireless Sensor Networks
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Biometric Identification and Security
  • Network Security and Intrusion Detection
  • Advanced Computing and Algorithms
  • AI in cancer detection
  • Interactive and Immersive Displays
  • Mobile Ad Hoc Networks
  • Vehicle Routing Optimization Methods
  • Optical Network Technologies
  • IoT-based Smart Home Systems

University of Anbar
2015-2024

Al-Qalam University College
2018-2023

Alsalam University College
2018-2023

University of Wasit
2023

University of Kirkuk
2018-2022

University Of Fallujah
2021

Iraqi University
2019

Information Technology University
2017

University of Toledo
2005-2006

The Royal Melbourne Hospital
2003

Abstroct--This paper addresses the maximal lifetime scheduling problem in sensor surveillance networks, Given a set of sensors and targets Euclidean plane, can watch only one target at time, our task is to schedule targets, such that system maximized, where duration all are watched, We propose an optimal solution find watching for achieves Lifetime.Our consists three steps: 1) computing n workload matrix by using linear programming techniques; 2) decomposing into sequence matrices achieve...

10.1109/infcom.2005.1498533 article EN 2005-08-24

Blockchain is an innovative technology that has gained interest in all sectors the era of digital transformation where it manages transactions and saves them a database. With increasing financial rapidly developed society with growing businesses many people looking for dream better financially independent life, stray from large corporations organizations to form startups small businesses. Recently, demand employees or institutes prepare manage contracts, papers, verifications process,...

10.21123/bsj.2023.8164 article EN cc-by Baghdad Science Journal 2023-05-20

The Identification of brain tumors is a critical step that relies on the expertise and abilities physician. In order to enable radiologists spot tumors, an automated tumor arrangement extremely important. This paper presents technique for MR image segmentation classification identify images as normal abnormal. proposed hybrid feature extraction submitted enhance results basically consists three stages. first stage used 3-level discrete wavelet transform (DWT) extract characteristics. second...

10.11591/eei.v10i5.3013 article EN Bulletin of Electrical Engineering and Informatics 2021-10-01

Data security, privacy, sensitivity, and integrity are major concerns when using cloud-based storage solutions. In this paper, we propose a hybrid encryption model that has been integrated with blockchain technology to secure data in the cloud. The proposed facilitates symmetric cryptography algorithm for efficient large while ensuring key can only be exchanged asymmetric cryptography. This utilizes power of manage metadata securely associated keys ensure records tamper-proof, removing need...

10.54216/jisiot.160217 article EN Journal of Intelligent Systems and Internet of Things 2025-01-01

Providing an efficient secure authentication scheme in safety applications Vehicular Ad-hoc Networks (VANETs) is a challenging issue. This because these need to react their messages, timely manner, before respective deadlines. Preserving the privacy of exchanged messages also important since include sensitive information, such as geographical locations. In this paper, we review existing schemes that aim meet requirements security and privacy. Then, specify with view design for real-time...

10.1109/hpcc/smartcity/dss.2018.00245 article EN 2018-06-01

The year 2020 has shown the quick spread and devastating effect of Coronavirus (COVID-19) on world economy, health, human life. Combating COVID-19 pandemic is crucial. Blockchain technology can assist in fight against by assuring safe reliable medical supplies, accurate identification virus hot spots, establishing data provenance to verify genuine personal protective equipment that decentralized, reliable, traceable, transparent. A major proportion current healthcare systems are centralized...

10.52866/ijcsm.2021.02.01.001 article EN cc-by Iraqi Journal for Computer Science and Mathematics 2021-01-30

Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In paper, some attacks were made on a proposed electronic election model based blockchain technology, where impact each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, time which it achieved calculated. study, we investigate Blockchain technology’s surface, focusing general blockchains. The following factors show how these have an model: 1)...

10.52866//ijcsm.2023.02.02.016 article EN cc-by Iraqi Journal for Computer Science and Mathematics 2023-05-04

Data encryption is an important issue and widely used in recent times to protect the data over internet ensure security. One of mostly public key cryptographies Elliptic Curve Cryptography (ECC). A new modified method has been proposed encrypt/decrypt using ECC this paper. This modification converts each character plaintext message its hexadecimal ASCII value two digits, then separates into values. After that, transformation performed on affine point E. modify ElGamal Cryptosystem (EGECC)...

10.17485/ijst/2015/v8i15/64749 article EN Indian Journal of Science and Technology 2015-07-07

This paper presents a variant of Advance Encryption Standard (AES) cipher that is depending on the same structure original AES Substitution Permutation Network (SPN) and mathematical background represented by Galois Field (GF28). The proposed encrypt decrypt data with block size 512-bit key 128-bit expanded into 512-bits which means four times larger than provide high margin security needs 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/dese.2011.74 article EN 2011 Developments in E-systems Engineering 2011-12-01

The security issues are very important for information technology applications now a day such as ATM and Smart cards. One of the recent public key cryptosystems is Elliptic Curves Cryptography. group elliptic curve points forms an Abelian group, that suitable choice constructing Curve Discrete Logarithm Problem (ECDLP). This led to create cipher system based on difficulty its solution. That open new windows treatment with special groups operations. paper provides three proposed techniques...

10.1109/icspcs.2012.6507952 article EN 2012-12-01

Improving the voting system has become a widely discussed issue. Paper-based elections are not safe because of possibility changing and adding ballots. Consequently, many countries use e-voting systems to ensure security, authenticity time efficiency. Blockchain can be adopted reduce fraud increase access from home, especially in pandemics. This paper suggests blockchain that tackles two security authentication issues. The been ensured using hybrid public-key cryptography; voter information...

10.3991/ijim.v16i20.33173 article EN International Journal of Interactive Mobile Technologies (iJIM) 2022-10-31

Today, there are many cryptographic algorithms that designed to maintain the data confidentiality, from these is AES.In AES-GCM, key in addition IV used encrypt plaintext obtain ciphertext instead of just traditional AES.The Use with order gain different for same was encrypted more than ones, key.In this paper, mechanism change each time AES-GCM modified get randomness ciphertext, thus increase difficulty breaking text through analysis original text.NIST statistical function were measure...

10.5815/ijmsc.2018.04.03 article EN International Journal of Mathematical Sciences and Computing 2018-11-07

The meaning of cloud computing is the Information Technology (IT) model for computing, which consists all IT components (software, hardware, services and, networking) that are needed to enable delivery and development through a private network or internet. In client (user) puts his data in cloud, any computations on stored will be implemented cloud. Security main thing because service provider can access, intentionally change even delete data. To protect it necessary use an encryption system...

10.5937/telfor1802118s article EN publisher-specific-oa Telfor Journal 2018-01-01

Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on Elliptic Curve Digital Signature Algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety security of bitcoin wallets. In this paper, secure key management was designed based several changes parts. cold wallet, we employed an image-based passphrase...

10.11591/eei.v10i1.2339 article EN Bulletin of Electrical Engineering and Informatics 2020-10-11

&lt;p&gt;Recently, due to an increase size and complexity of data in addition the management issues, storage is required a great deal attention employ it realistic applications, so requirement for designing implementing warehouse system has become urgent necessity, ETL represents vital side architecture. This paper, designed application contains web process that divides its work between input device server. proposed solve problem lack partition The can be used applied many branches...

10.11591/ijai.v12.i2.pp765-775 article EN IAES International Journal of Artificial Intelligence 2022-12-12

In the age of Internet, a lot images are circulated among users, and some these contain financial or personal information that requires confidentiality. Encryption algorithms existed for long time, data used was focused on text data, while multimedia neglected time. addition, there significant shortcomings in 3D image coding techniques. This paper proposed method encrypted decrypted electronically using Lorenz chaotic system, supposed algorithm developed by three equations before that,...

10.51173/jt.v5i1.840 article EN cc-by Journal of Techniques 2023-04-03

Steganography is the study of invisible communication, which typically focuses on methods concealing existence communicated message.Steganography now widely used as a means protecting sensitive data.The term "security" in steganography systems mainly implies to idea "undetectability", that is, how effective steganographic method for hiding data terms its capability avoid detection through statistical analysis and remain undiscovered even if cover media found by an unauthorized party.There...

10.12785/ijcds/160161 article EN cc-by-nc-nd International Journal of Computing and Digital Systems 2024-05-14

One of the most essential components human life is sleep. first steps in spotting abnormalities connected to sleep classifying stages. Based on kind and frequency signals obtained during a polysomnography test, phases can be separated into groups. Accurate classification stages from electroencephalogram (EEG) plays crucial role disorder diagnosis treatment. This study proposes novel approach that combines feature selection techniques with convolutional neural networks (CNNs) enhance...

10.3390/a17060229 article EN cc-by Algorithms 2024-05-24

Through the analysis of biological, behavioral, or a combination both traits, biometrics entails identification specific persons. Finger veins, iris patterns, fingerprints, and DNA are examples common biometric qualities. Of these, fingerprints most commonly utilized since they highly distinctive, simple to obtain, can be obtained from variety sources (because each person has ten fingers). In addition introducing method for identifying region interest (ROI), which is area selected...

10.58496/bjai/2024/013 article EN Deleted Journal 2024-08-25

The rapid industrial and technological development along with the continues need to improve lifestyle have led emergence of Internet Things (IoT) as a service. Due its nature, there are huge amount data been transmitted over IoT in every minute. Considering security aspects such data, limited resources including bandwidth energy, requires an innovative way securing driven environment. This study aims propose low-cost encryption algorithm (NVLC) handle Radio-frequency Identification (RFID)...

10.1109/aicis.2018.00042 article EN 2018-11-01
Coming Soon ...