— The rapid development of wireless communication networks in recent years has made vehicle to ve... more — The rapid development of wireless communication networks in recent years has made vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications possible in mobile ad hoc networks (MANETs). It has also led to the development of a new technology called vehicular ad hoc network (VANET), which aims to achieve road safety, infotainment, and a comfortable driving experience. It can support safety systems designed to avoid road accidents in two ways: 1) periodic transmissions (beacon) from all vehicles that inform neighbors about their current status, and 2) dissemination of emergency messages to warn other vehicles to avoid the danger. The intent of the research is to propose an efficient safety system for VANET by designing communication protocols and techniques to provide the means for successful transmission of safety-related information. Therefore, three protocols based on power control, contention, and position-based mechanisms are proposed to shape data traffic, such...
This research presents effective technique for image encryption which employs Red, Green and Blue... more This research presents effective technique for image encryption which employs Red, Green and Blue (RGB) components of the RGB color image. The proposed technique utilizes matrix multiplication and inverse matrices for encryption-decryption purpose. Moreover, the effectiveness of the proposed encryption-decryption techniques lay on minimizing the encryption-decryption time and the square error between the original and the decrypted image. The evaluations of the proposed technique were done using many images with different sizes, while the experimental results show that the improved encryption technique time are greatly reduced compared with “RGB Color Image Encryption-Decryption Using Gray Image” method. The proposed technique has a high confidentiality level through using confusion diffusion sequentially with a square matrix key and two vectors keys. However, those keys are generated randomly and make the process of hacking the image very difficult.
Elliptic Curve Cryptography (ECC) is an attractive field of research since it requires a shorter ... more Elliptic Curve Cryptography (ECC) is an attractive field of research since it requires a shorter key length compared to other public-key cryptosystems such as RSA. A shorter key reduces the required computations, power consumption, and storage. The major time-consuming operation in ECC is the point multiplication, kP . Therefore, a lot of research has been carried out to improve the efficiency of ECC implementations. Composite Elliptic Curve (EC) operations and recoding methods are two factors that affect the efficiency of EC scalar multiplication. Deciding which composite EC operation to be used in an ECC system helps to improve the computational efficiency. In addition, finding a method that accelerates the EC computations, which depends on a new recoding method and employing the most efficient composite operations, is considered a pressing need. In this a research, a survey of EC single scalar multiplication methods is introduced. Therefore, a comprehensive information related to...
International journal of engineering research and technology, 2018
Cloud computing is the next big thing after internet in the field of information technology. It i... more Cloud computing is the next big thing after internet in the field of information technology. It is an internet-based computing technology, in which software, shared resources and information, are provided to consumers and devices ondemand. Benefits of cloud storage are easy access, scalability, resilience, cost efficiency and high reliability of the data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. Privacy and security are the key issue for cloud storage. The proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud. In this paper, the proposed solution will be introduced to increase security in cloud computing. The multilevel encryption on cloud data is a method to secure data from access of ...
An introduction to the proceedings of 2014 first CRF international conference in which the basis ... more An introduction to the proceedings of 2014 first CRF international conference in which the basis of the question of matter in contemporary age are discussed by taking reference to history of ancient and modern philosoph
2021 International Conference on Information Technology (ICIT), 2021
Communication methods in the world are constantly evolving, this means that the amounts of data s... more Communication methods in the world are constantly evolving, this means that the amounts of data sent through open networks are in populated quantities, so there must be means to protect that data sent, and this could be done by information protection systems by encryption and coding of the data in order to protect the content of that data sent. The main aim of encrypting and encoding data is to protect the integrity of the data, and also to ensure the confidentiality of the data source, this is done through the use of algorithms for encryption and encoding the data, with the aim of changing its content using those algorithms and returning its original content with the same algorithms used to encrypt it, through a symmetric secret key for encryption and decryption. In this paper, the researcher highlights the weakness of the basic RC4 algorithm, which lies in the stability of the key used in scheduling the key, as a prelude to generating the stream keys used in serial byte encryption, so the RC4-Pr algorithm was modified by adding an additional permutation function by performing a key permutation operation to produce a different key in each 16-bytes (128-bits) cipher round.
International Journal of Digital Content Technology and its Applications, 2011
ABSTRACT In network forensics, attack intention analyses play a major role in accelerating the de... more ABSTRACT In network forensics, attack intention analyses play a major role in accelerating the decision- making process for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing alert correlation for certain evidence. In reality, investigator should use more prediction factors decision such as attack intention, strategy, and incident path to come to a more precise decision. This paper proposes an Attack Intention Analysis (AIA) algorithm that focuses on the reasoning of attacks of uncertain intentions. A new algorithm will be introduced using a combination of a mathematical Dempster-Shafer (D-S) evidence theory with a probabilistic technique through a causal network to predict an attack intention. The algorithm uses the D-S theory as an efficient method for identifying uncertain intentions, and gives the probability for intentions that could be ignored or discarded. Furthermore, the casual network could represent the probabilistic relationship of attacks, evidence and their intentions. We found that by analyzing the intention of the attacker, forensic investigation agents will be able to audit and perform their investigations effectively and efficiently. Experiments were performed on packet capture (PCAP) where network data traffic holds a backdoor attack to evaluate the proposed algorithm. From the observations, AIA may constitute a clear and important factor for helping investigator to make decision.
This is an epidemiological survey of 105 burned patients treated between May 1986 and May 1988 in... more This is an epidemiological survey of 105 burned patients treated between May 1986 and May 1988 in a modern Burns Unit in Saudi Arabia. Hospitalization time ranged from 1 to 100 days with a mean of 17 days. The mean age of the patients was 9 years. Sixty (57 per cent) of the patients were males and 45 (43 per cent) were females. The main causes of injury were hot liquids (57.7 per cent) and fire (33 per cent). The mean extent of injury was 19 per cent TBSA. Burns covered less than 40 per cent TBSA in 91 out of 105 patients (87 per cent). Deep burns did not exceed 100 units of burned skin in 48 out of 55 patients (87 per cent). Urgent escharotomy was done in 14 patients. Early excision and skin grafting was carried out in 34 patients. Complications included six cases (5.7 per cent) with septicaemia, one (0.9 per cent) with disseminated intravascular coagulopathy, three (2.9 per cent) with amputation and one (0.9 per cent) with stress gastric ulcer. Seven patients discharged themselves against medical advice. Five patients died. The favourable results in this series were attributed mainly to the low severity of burns and partially to the short delay between injury and admission, early surgery and remarkably good facilities. Childhood scalds in this region of the world could possibly be reduced by changing the family habit of having tea at floor level and recommending wide-based tea-pots.
— The rapid development of wireless communication networks in recent years has made vehicle to ve... more — The rapid development of wireless communication networks in recent years has made vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications possible in mobile ad hoc networks (MANETs). It has also led to the development of a new technology called vehicular ad hoc network (VANET), which aims to achieve road safety, infotainment, and a comfortable driving experience. It can support safety systems designed to avoid road accidents in two ways: 1) periodic transmissions (beacon) from all vehicles that inform neighbors about their current status, and 2) dissemination of emergency messages to warn other vehicles to avoid the danger. The intent of the research is to propose an efficient safety system for VANET by designing communication protocols and techniques to provide the means for successful transmission of safety-related information. Therefore, three protocols based on power control, contention, and position-based mechanisms are proposed to shape data traffic, such...
This research presents effective technique for image encryption which employs Red, Green and Blue... more This research presents effective technique for image encryption which employs Red, Green and Blue (RGB) components of the RGB color image. The proposed technique utilizes matrix multiplication and inverse matrices for encryption-decryption purpose. Moreover, the effectiveness of the proposed encryption-decryption techniques lay on minimizing the encryption-decryption time and the square error between the original and the decrypted image. The evaluations of the proposed technique were done using many images with different sizes, while the experimental results show that the improved encryption technique time are greatly reduced compared with “RGB Color Image Encryption-Decryption Using Gray Image” method. The proposed technique has a high confidentiality level through using confusion diffusion sequentially with a square matrix key and two vectors keys. However, those keys are generated randomly and make the process of hacking the image very difficult.
Elliptic Curve Cryptography (ECC) is an attractive field of research since it requires a shorter ... more Elliptic Curve Cryptography (ECC) is an attractive field of research since it requires a shorter key length compared to other public-key cryptosystems such as RSA. A shorter key reduces the required computations, power consumption, and storage. The major time-consuming operation in ECC is the point multiplication, kP . Therefore, a lot of research has been carried out to improve the efficiency of ECC implementations. Composite Elliptic Curve (EC) operations and recoding methods are two factors that affect the efficiency of EC scalar multiplication. Deciding which composite EC operation to be used in an ECC system helps to improve the computational efficiency. In addition, finding a method that accelerates the EC computations, which depends on a new recoding method and employing the most efficient composite operations, is considered a pressing need. In this a research, a survey of EC single scalar multiplication methods is introduced. Therefore, a comprehensive information related to...
International journal of engineering research and technology, 2018
Cloud computing is the next big thing after internet in the field of information technology. It i... more Cloud computing is the next big thing after internet in the field of information technology. It is an internet-based computing technology, in which software, shared resources and information, are provided to consumers and devices ondemand. Benefits of cloud storage are easy access, scalability, resilience, cost efficiency and high reliability of the data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. Privacy and security are the key issue for cloud storage. The proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud. In this paper, the proposed solution will be introduced to increase security in cloud computing. The multilevel encryption on cloud data is a method to secure data from access of ...
An introduction to the proceedings of 2014 first CRF international conference in which the basis ... more An introduction to the proceedings of 2014 first CRF international conference in which the basis of the question of matter in contemporary age are discussed by taking reference to history of ancient and modern philosoph
2021 International Conference on Information Technology (ICIT), 2021
Communication methods in the world are constantly evolving, this means that the amounts of data s... more Communication methods in the world are constantly evolving, this means that the amounts of data sent through open networks are in populated quantities, so there must be means to protect that data sent, and this could be done by information protection systems by encryption and coding of the data in order to protect the content of that data sent. The main aim of encrypting and encoding data is to protect the integrity of the data, and also to ensure the confidentiality of the data source, this is done through the use of algorithms for encryption and encoding the data, with the aim of changing its content using those algorithms and returning its original content with the same algorithms used to encrypt it, through a symmetric secret key for encryption and decryption. In this paper, the researcher highlights the weakness of the basic RC4 algorithm, which lies in the stability of the key used in scheduling the key, as a prelude to generating the stream keys used in serial byte encryption, so the RC4-Pr algorithm was modified by adding an additional permutation function by performing a key permutation operation to produce a different key in each 16-bytes (128-bits) cipher round.
International Journal of Digital Content Technology and its Applications, 2011
ABSTRACT In network forensics, attack intention analyses play a major role in accelerating the de... more ABSTRACT In network forensics, attack intention analyses play a major role in accelerating the decision- making process for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing alert correlation for certain evidence. In reality, investigator should use more prediction factors decision such as attack intention, strategy, and incident path to come to a more precise decision. This paper proposes an Attack Intention Analysis (AIA) algorithm that focuses on the reasoning of attacks of uncertain intentions. A new algorithm will be introduced using a combination of a mathematical Dempster-Shafer (D-S) evidence theory with a probabilistic technique through a causal network to predict an attack intention. The algorithm uses the D-S theory as an efficient method for identifying uncertain intentions, and gives the probability for intentions that could be ignored or discarded. Furthermore, the casual network could represent the probabilistic relationship of attacks, evidence and their intentions. We found that by analyzing the intention of the attacker, forensic investigation agents will be able to audit and perform their investigations effectively and efficiently. Experiments were performed on packet capture (PCAP) where network data traffic holds a backdoor attack to evaluate the proposed algorithm. From the observations, AIA may constitute a clear and important factor for helping investigator to make decision.
This is an epidemiological survey of 105 burned patients treated between May 1986 and May 1988 in... more This is an epidemiological survey of 105 burned patients treated between May 1986 and May 1988 in a modern Burns Unit in Saudi Arabia. Hospitalization time ranged from 1 to 100 days with a mean of 17 days. The mean age of the patients was 9 years. Sixty (57 per cent) of the patients were males and 45 (43 per cent) were females. The main causes of injury were hot liquids (57.7 per cent) and fire (33 per cent). The mean extent of injury was 19 per cent TBSA. Burns covered less than 40 per cent TBSA in 91 out of 105 patients (87 per cent). Deep burns did not exceed 100 units of burned skin in 48 out of 55 patients (87 per cent). Urgent escharotomy was done in 14 patients. Early excision and skin grafting was carried out in 34 patients. Complications included six cases (5.7 per cent) with septicaemia, one (0.9 per cent) with disseminated intravascular coagulopathy, three (2.9 per cent) with amputation and one (0.9 per cent) with stress gastric ulcer. Seven patients discharged themselves against medical advice. Five patients died. The favourable results in this series were attributed mainly to the low severity of burns and partially to the short delay between injury and admission, early surgery and remarkably good facilities. Childhood scalds in this region of the world could possibly be reduced by changing the family habit of having tea at floor level and recommending wide-based tea-pots.
Uploads
Papers