Yazar "Ibrahim, A.A." seçeneğine göre listele
Listeleniyor 1 - 8 / 8
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Design and Development of Interconnected Renewable Energy Sources Focused on Grid Power Inverter Energy for Sustainable Development A Review(Institute of Electrical and Electronics Engineers Inc., 2020) Namaa, H.M.; Mohammed, A.H.; Raheem, S.A.; Taha, M.Y.; Ibrahim, A.A.Expanding energy request because of quick industrialization, ecological worries about creation reliant on petroleum derivatives, declining fossil energy assets, clog of the transmission organization and weakening specialized execution are the drivers behind the coordination of little inexhaustible dispersed age (DG) units and the change of existing energy. Changes frameworks into a rebuilt framework. Enhancing the specialized favorable circumstances offered by DG position is a known test to Distribution Network Operators (DNOs) for both fossil and sustainable power source based DGs, yet DG inexhaustible frameworks additionally have an assortment of energy quality (PQ) challenges. This article gives an exhaustive examination of energy quality difficulties with the momentum research case for GM regenerative frameworks network incorporation and related relief innovations. To start with, this article hypothetically underscores indicating all the significant energy quality difficulties related with matrix joining for sustainable power source, and second, an exhaustive investigation of all PQI advancements acquainted with date is definite, featuring future examination openings. Moreover, all significant energy quality issues and the effect of high infiltration of sustainable power source and relief advancements on energy quality were represented by recreating a lattice put together DG framework based with respect to PV in MATLAB/Simulink. This article is accepted to be extremely useful for scholastics just as industry experts to comprehend the ebb and flow PQ challenges, PQI advances, and future examination headings for sustainable power source advances. © 2020 IEEE.Öğe Design of Health Care Monitoring System Based on Internet of Thing (IOT)(Institute of Electrical and Electronics Engineers Inc., 2020) Abdulameer, T.H.; Ibrahim, A.A.; Mohammed, A.H.The Internet has made this place a worldwide city and web of things (IoT) by allowing the range of captors and keen items to collect and process data for various use. In weakening the physical structures of the digital shrewd (IoT) shrewd items become a definitive building. The IoT has a variety of applications, including social security. Different restore and post-operative information should be screened. The human services correspondence using the Web of Things (IoT) technique is adjusted to achieve the therapeutic parameters in the nearby and remote zones. In this paper, we use the remote health care system using advanced information technology and new communications developments and remote physiological measuring technology. The remote benefit services framework provides for the 'free welfare authorities' and 'remote long-term human services administrations' through an entire 'remote social insurance data stage' work instrument by way of coordinated terminal programming and improved social insurance modules. This would encourage the real-time activities of elderly citizens and monitor the healthcare system. The information gathered from various sensors is stored on a local server that connects people, physicians and practitioners to the right information at the time of an emergency. In this way, the framework could increase availability, productivity and reduce well-being costs in order to increase peace of mind and safety. I hope the design and implementation of this system will improve elderly health monitoring in future. © 2020 IEEE.Öğe Effects of Clem Cloud Based E-Learning Management System for Teaching A Review(Institute of Electrical and Electronics Engineers Inc., 2020) Raheem, S.A.; Mohammed, A.H.; Namaa, H.M.; Taha, M.Y.; Ibrahim, A.A.To address contemporary difficulties, global designers must be prepared in cutting edge learning conditions, aptitudes and expert information. Upheld by the United States Agency for International Development (USAID), the Build-IT program (Building University Learning, Industry, and Development through Innovation and Technology) expands on the wide capacities of the executing accomplice from ASU and assumes a key function as a pioneer chief. In gathering characters from different fields. An all around prepared designer can add to the economical advancement of a general public. So as to make a network focused training, an incorporated technique has been proposed in which an issue based learning strategy is investigated to apply specialized information. In accordance with this methodology, in the way we are proposing, mechatronics designing understudies originally needed to work with different understudies in the fields of hardware, programming, control mechanization, and mechanics, and afterward planned an open, interdisciplinary, incorporated educational program. By working together with peers in building up this hardware, understudies are better outfitted with explicit information. This cycle additionally causes understudies to feel certain about applying their imaginative thoughts while protecting the essential significance of the apparatus. A significant advantage of this methodology is that helping understudies defeat their issues all the while upgrades the specialist's activity in the public arena, in spite of losing a portion of the particular range of abilities. The current methodology, in view of exact investigations utilizing this open structure, shows that understudies in our program have adequate abilities to add to social accomplishments. At long last, the useful, ease, and instructive visual device made by the members shows the estimation of this multidisciplinary approach. © 2020 IEEE.Öğe Internet of Things and Cloud Computing - A Review(Institute of Electrical and Electronics Engineers Inc., 2020) Taha, M.Y.; Kurnaz, S.; Ibrahim, A.A.; Mohammed, A.H.; Raheem, S.A.; Namaa, H.M.Digital networking has been a popular platform for Modern Socio-Physical Networks (CPSS) and the Internet of Things (IoT). However, the issue of how to maintain data transfer and storage protection at CPSS is a big concern that needs to be tackled. During the CPSS transport and storage process we must protect the security and privacy of user data and user identity. To deter users of IoT devices from leaking personal information during data analysis and the transition process, we present a thorough overview of the subject Computational Diffie-Hellman (CDH). © 2020 IEEE.Öğe IoT Ddos Attack Detection Using Machine Learning(Institute of Electrical and Electronics Engineers Inc., 2020) Aysa, M.H.; Ibrahim, A.A.; Mohammed, A.H.The distribution strategy of a botnet mainly directs its configuration, installing a support of bots for coming exploitation. In this article, we utilize the sources of pandemic modeling to IoT networks consisting of WSNs. We build a proposed framework to detect and abnormal defense activities. According to the impact of IoT-specific features like insufficient processing power, power limitations, and node density on the formation of a botnet, there are significant challenges. We use standard datasets for active two famous attacks, such as Mirai. We also used many machine learning and data mining algorithms such as LSVM, Neural Network, and Decision tree to detect abnormal activities such as DDOS features. In the experimental results, we found that the merge between random forest and decision tree achieved high accuracy to detect attacks. © 2020 IEEE.Öğe A Lightweight Image Encryption and Blowfish Decryption for the Secure Internet of Things(Institute of Electrical and Electronics Engineers Inc., 2020) Saddam, M.J.; Ibrahim, A.A.; Mohammed, A.H.As an innovative technology of the future, the Internet of Things (IoT) is expected to connect billions of users. Increased connectivity is expected to generate mountains of data and data protection can be a threat. Architectural tools, in principle, are smaller in size and low in strength. Due to their sophistication, traditional encryption algorithms are often computationally ineffective and require multiple rounds of coding, effectively wasting restricted device resources. But a less complex algorithm will jeopardize required honesty. In this article we propose a lightweight coding algorithm called Stable IoT (SIT). It is a 64-bit block encryption that requires a 64-bit key to encrypt data. Low complexity coding symmetry algorithm called Stable Power with Affine Shift. The coding component can be implemented using a simple syntax consisting of only basic mathematical operations (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This will help reduce the encoder, as the more complex key expansion method is only done in decryption. The purpose of this document is to conduct a security review and evaluate the performance of the proposed algorithm. The design of the algorithm is a combination of emotion and a unified switch-switch network. Simulation testing reveals that the algorithm provides adequate protection in only five rounds of encryption. The algorithm is hardware-implemented with a low-cost 8-bit microcontroller and the effects of code size, memory consumption, and encryption / decoding execution cycles are contrasted with reference encryption algorithms. © 2020 IEEE.Öğe Scheduling Data Allocation in Packet Based Wireless Communication System Using Data Mining(Institute of Electrical and Electronics Engineers Inc., 2020) Al-Shukrawi, A.A.; Mahmood, M.T.; Ibrahim, A.A.The purpose of this thesis is scheduling data allocation in large scale networks and in packet based wireless communication system, specifically in the Evolved Packet Core network (EPC) and its various systems and sub-components in order to identify possible areas within the network where machine learning algorithms can be integrated in order to automate some of its tasks. The thesis involves the study of existing literature in order to identify viable machine learning methods that have been successfully integrated into telecommunication networks, and then evaluate whether they are applicable to be utilized within the EPC network. The thesis also involves the introduction of new features and improvements to the network which are also achieved through machine learning. The intention is to explore both supervised and unsupervised learning, depending on the type of data used and tasks that are performed by the network's various components. This is done through extensive research of the network's main and support nodes, followed by detailed proposals of implementation of new and existing tasks within the node using machine learning. This thesis aims to find out the data allocation (DA) in packet based wireless communication system using data mining strategies which achieves load balancing and better communication in wireless communication networks from the proportional fairness perspective. We will look for the DA scheduling strategy that benefits wireless communication networks the most. Wireless communication networks have an emerging wireless communication architecture where access nodes of different types are deployed throughout the geographical area to off-load traffic from macro cells to different data allocation for quick communication and this thesis will provide three major contributions to the advance research of communication. For the training, testing and validation of KDD (Knowledge Discovery and Data Mining) Cup 2019 dataset a well-known MATLAB software was used for this purpose. We used Clustering based Algorithm in Data Mining. © 2020 IEEE.Öğe Securing 5G Network using low power wireless personal area network(Institute of Electrical and Electronics Engineers Inc., 2020) Al-Sarray, Z.A.; Mahmood, M.T.; Ibrahim, A.A.The purpose of this work was to get acquainted with wireless communication technologies and the information security challenges they create from the viewpoint of 5G and its preceding technologies. 5th Generation (5G) is becoming a global phenomenon and it is currently being implemented in dozens of countries around the globe with it comes new information security challenges. Potential solutions for the challenges are also offered. The outcome of this research is an overview of information security challenges in 5G using Low-power wireless personal area Network (LPWAN) and in the technologies preceding 5G. Possible information security solutions are presented in this work for the new technologies coming with 5G. This work showed that the new technologies coming with 5G, such as the virtualization of hardware and services as well as the utilization of cloud computing, create completely new areas of attack for networks. With this knowledge, Labelled and Freely Available Dataset from Open-Source Repository will be used and it is possible to prevent attacks targeting networks by implementing necessary information security elements. For the training, testing and validation of our dataset which is an IoT and cyber-security based dataset, a well-known MATLAB R2019a software was used for this purpose. The proposed reinforcement learning algorithm for Securing 5G network is designed for mesh topology from the ground up by the model of the network itself using low power personal area networks. We model the network operating in a finite area with a finite number of nodes distributed inside the area randomly in this algorithm. Hence, we defined the service area of the target network by assuming the finiteness of the network in the model. © 2020 IEEE.