Yazar "Ali, Adnan Hussein" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Based on mesh sensor network: design and implementation of security monitoring system with Bluetooth technology(Institute of Advanced Engineering and Science, 2022) Hameed, Bilal Hashim; Taher, Anmar Yahya; Ibrahim, Raed Khalid; Ali, Adnan Hussein; Hussein, Yasser AdnanOne of the most critical aspects to consider in wireless sensor networks is security, particularly in internet of things (IoT) implementations. Sensor network applications had risen in the past 5 years since these networks have been used in various parts of life (smart residential and commercial buildings, medical, and agriculture). In this study, we provide a novel network of sensors based on the Bluetooth network that may be used to protect commercial buildings. The Bluetooth type HC 06 was chosen since it has a low energy consumption and a communication range of 100 meters. Such security network includes motion sensors and control cameras that are controlled by an Arduino Nano microcontroller. The motion sensor's primary characteristics are solely applicable to humans, and the Arduino Nano is an open-source microcontroller. The key benefit of this research is that it demonstrates how to create a low-cost Bluetooth sensor security network with limited storage space for control movies. © 2022 Institute of Advanced Engineering and Science. All rights reserved.Öğe Optimization of fuzzy logic-based clustering for wireless sensor networks(2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023, 2023) Hussein, Ahmed Mohammed; Kurnaz, Sefer; Saad, Mohammed Ayad; Ibrahim, Raed Khalid; Ali, Adnan Hussein; Taher, Anmar YahyaA strong framework for managing complicated and uncertain data patterns is provided by fuzzy C-Means (FCM) clustering, a potent and frequently used data analysis technique that is adaptable for data clustering in a variety of applications, including pattern recognition, picture segmentation, and data mining. Assigning data points to various clusters with different degrees of membership, in contrast to typical hard clustering approaches, makes FCM especially well-suited for situations where data show ambiguity and overlap. An overview of FCM is given in this abstract, emphasizing its fundamental ideas, iterative optimization procedure, and capacity to manage intricate data patterns. It also goes over the benefits and uses of FCM in practical situations, highlighting how it can be used to provide cluster assignments that are both flexible and nuanced. For researchers and practitioners looking for efficient ways to cluster data even in the face of ambiguity and incomplete memberships, FCM remains a useful tool.Öğe Secure Medical Image Steganography Method Based on Pixels Variance Value and Eight Neighbors(Institute of Electrical and Electronics Engineers Inc., 2021) Abed, Mohammed K.; Kareem, Marwah M.; Ibrahim, Raed Khalid; Hashim, Mohammed M.; Kurnaz, Sefer; Ali, Adnan HusseinThe security aspect of processes and methodologies in the information and communication technology era is the main part. The security of information should a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography, watermark, and cryptography. In cryptography, the secrete message is converted into unintelligible text, but the existence of the secrete message is noticed, on the other hand, watermarking and steganography involve hiding the secrete message in a way that its presence cannot be noticed. Presently, the design and development of an effective image steganography system are facing several challenges such as the low capacity, poor robustness and imperceptibility. To surmount these challenges, a new secure image steganography work called the Pixels Variance (PV) method is proposed along with the eight neighbors method and Huffman coding algorithm to overcome the imperceptibility and capacity issues. In proposed method, a new image partitioning with Henon map is used to increase the security part and has three main stages (preprocessing, embedding, and extracting) each stage has different process. In this method, different standard images were used such as medical images and SIPI-dataset. The experimental result was evaluated with different measurement parameters such as Peak signal-to-noise ratio (PSNR) and Structural Similarity Index (SSIM). In short, the proposed steganography method outperformed the commercially available data hiding schemes, thereby resolved the existing issues. © 2021 IEEE.