Mustafa Qahtan Alsudani
Imam Ja’afar Al-sadiq University

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Storage and encryption file authentication for cloud-based data retrieval Mustafa Qahtan Alsudani; Hassan Falah Fakhruldeen; Heba Abdul-Jaleel Al-Asady; Feryal Ibrahim Jabbar
Bulletin of Electrical Engineering and Informatics Vol 11, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i2.3344

Abstract

The amount of data that must be processed, stored, and modified rises as time passes. An enormous volume of data from a wide range of sources must be stored on a safe platform. Maintaining such a large volume of data on a single computer or hard drive is impracticable. As a result, the cloud is the ideal platform for storing any quantity of data. An advantage of storing data in the cloud is that it may be accessed at any time and from any device. However, the security of data stored in the cloud is a big concern. Because of this, despite the benefits, most users are reluctant to move their papers to the cloud. The data should be encrypted before sending it off to the cloud service provider to avoid this issue. It's a great way to increase the security of your papers. According to a new technique presented in the system, data may be searched across encrypted files without compromising the privacy and security of various data owners. Implementing the pallier homomorphic encryption method makes it possible to perform computations on encrypted data without decryption.
Channel estimation of OFDM in C-band communication systems under different distribution conditions Heba Abdul-Jaleel Al-Asady; Hassan Falah Fakhruldeen; Mustafa Qahtan Alsudani
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1778-1782

Abstract

Orthogonal frequency division multiplexing (OFDM) is a transmission system that uses multiple orthogonal carriers that are sent out at the same time. OFDM is a technique for mobile and wireless communication that has high-efficient frequency utilization, high data-rate transmission, simple and efficient implementation using the fast Fourier transform (FFT) and the inverse fast Fourier transform (IFFT), and reduces inter symbol interference (ISI) by inserting cyclic prefix (CP). One of the most important approaches in an OFDM system is channel estimation. In this paper, the orthogonal frequency division multiplexing system with the Rayleigh channel module is analyzed for different areas. The proposed approach used large numbers of subcarriers to transmit the signals over 64-QAM modulation with pilot add channel estimation. The accuracy of the OFDM system is shown in the measuring of the relationships of peak power to the noise ratio and bit error rate.
Assessment of control and monitoring system design security using the attack security tree analysis method Mustafa Qahtan Alsudani; Israa Fayez Yousif; Ahmed Nooruldeen Alsafi; Hassan Falah Fakhruldeen
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp820-827

Abstract

Because of the efficiency of the system and the fact that it successfully completed the tasks that were given to it under specific conditions, we are compelled to look for a way to measure these requirements according to the conditions and guidelines that were established by the people who make use of the system. Conduct an investigation into the many techniques that are available for use in analysis in light of the following conditions: i) sufficient time to detect the mistake, ii) time to maintenance, iii) the total number of constituents involved in the analytical process, and iv) an explanation of the level of complexity provided to the user. In this article, we will provide a concise overview of a number of different approaches, along with our recommendations for the most effective ones based on the issues raised earlier.
A clustering approach to improve VANETs performance Hayder Ayad Khudhair; Alaa Taima Albu-Salih; Mustafa Qahtan Alsudani; Hassan Falah Fakhruldeen
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.5086

Abstract

Vehicular ad-hoc network (VANET) is a technique that uses cars moved in cities or highways as nodes in wireless networks. Each car in these networks works as a router and allows cars in the range to communicate with each other. As a result of this movement, some cars will become out of range, but these networks can connect to the internet and the cars in these networks can connect to each other. This research proposes a unique clustering strategy to improve the performance of these networks by making their clusters more stable. One of the biggest problems these networks face is traffic data, which consumes network resources. Agent based modeling (ABM) evaluates better networks. The evaluation showed that the proposed strategy surpasses earlier techniques in reachability and throughput, but ad hoc on-demand distance vector (AODV) (on-demand/reactive) outperforms it in total traffic received since our hybrid approach needs more traffic than AODV.